City: Shaw
Region: Washington
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.112.139.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16136
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;166.112.139.6. IN A
;; AUTHORITY SECTION:
. 578 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020050101 1800 900 604800 86400
;; Query time: 396 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 21:16:47 CST 2020
;; MSG SIZE rcvd: 117
6.139.112.166.in-addr.arpa has no PTR record
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 6.139.112.166.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
185.57.69.23 | attackspam | 1582464419 - 02/23/2020 14:26:59 Host: 185.57.69.23/185.57.69.23 Port: 445 TCP Blocked |
2020-02-24 00:41:11 |
117.62.62.154 | attackbots | lfd: (smtpauth) Failed SMTP AUTH login from 117.62.62.154 (-): 5 in the last 3600 secs - Thu Jun 21 08:41:24 2018 |
2020-02-24 00:26:05 |
141.98.80.139 | attack | Feb 23 17:42:00 relay postfix/smtpd\[13659\]: warning: unknown\[141.98.80.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 23 17:42:07 relay postfix/smtpd\[8265\]: warning: unknown\[141.98.80.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 23 17:42:26 relay postfix/smtpd\[8265\]: warning: unknown\[141.98.80.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 23 17:42:33 relay postfix/smtpd\[17848\]: warning: unknown\[141.98.80.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Feb 23 17:44:10 relay postfix/smtpd\[17848\]: warning: unknown\[141.98.80.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-02-24 00:55:35 |
117.84.115.48 | attackspam | lfd: (smtpauth) Failed SMTP AUTH login from 117.84.115.48 (48.115.84.117.broad.wx.js.dynamic.163data.com.cn): 5 in the last 3600 secs - Thu Jun 21 02:48:11 2018 |
2020-02-24 00:58:23 |
188.226.104.144 | attackbots | Unauthorized connection attempt detected from IP address 188.226.104.144 to port 445 |
2020-02-24 00:37:28 |
222.186.30.209 | attack | 2020-02-23T17:47:27.019073vps751288.ovh.net sshd\[8737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.209 user=root 2020-02-23T17:47:29.387298vps751288.ovh.net sshd\[8737\]: Failed password for root from 222.186.30.209 port 57874 ssh2 2020-02-23T17:47:31.626610vps751288.ovh.net sshd\[8737\]: Failed password for root from 222.186.30.209 port 57874 ssh2 2020-02-23T17:47:33.805661vps751288.ovh.net sshd\[8737\]: Failed password for root from 222.186.30.209 port 57874 ssh2 2020-02-23T17:54:18.333695vps751288.ovh.net sshd\[8750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.209 user=root |
2020-02-24 00:57:00 |
159.89.194.103 | attackspam | Feb 23 16:22:40 server sshd\[6465\]: Invalid user samuel from 159.89.194.103 Feb 23 16:22:40 server sshd\[6465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.103 Feb 23 16:22:42 server sshd\[6465\]: Failed password for invalid user samuel from 159.89.194.103 port 55892 ssh2 Feb 23 16:26:46 server sshd\[7179\]: Invalid user ftpuser from 159.89.194.103 Feb 23 16:26:46 server sshd\[7179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.103 ... |
2020-02-24 00:51:18 |
51.161.9.137 | attackbotsspam | Feb 23 16:28:28 srv-ubuntu-dev3 sshd[87682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.161.9.137 user=www-data Feb 23 16:28:30 srv-ubuntu-dev3 sshd[87682]: Failed password for www-data from 51.161.9.137 port 35760 ssh2 Feb 23 16:31:45 srv-ubuntu-dev3 sshd[87928]: Invalid user smmsp from 51.161.9.137 Feb 23 16:31:45 srv-ubuntu-dev3 sshd[87928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.161.9.137 Feb 23 16:31:45 srv-ubuntu-dev3 sshd[87928]: Invalid user smmsp from 51.161.9.137 Feb 23 16:31:47 srv-ubuntu-dev3 sshd[87928]: Failed password for invalid user smmsp from 51.161.9.137 port 36954 ssh2 Feb 23 16:35:05 srv-ubuntu-dev3 sshd[88166]: Invalid user admin01 from 51.161.9.137 Feb 23 16:35:05 srv-ubuntu-dev3 sshd[88166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.161.9.137 Feb 23 16:35:05 srv-ubuntu-dev3 sshd[88166]: Invalid user admin01 from 51 ... |
2020-02-24 00:50:32 |
118.254.70.204 | attackbots | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-02-24 00:30:46 |
200.10.96.234 | attackbots | Feb 23 10:56:53 plusreed sshd[16307]: Invalid user docker from 200.10.96.234 ... |
2020-02-24 00:55:09 |
112.85.42.172 | attack | Feb 23 18:31:15 ift sshd\[17702\]: Failed password for root from 112.85.42.172 port 63399 ssh2Feb 23 18:31:18 ift sshd\[17702\]: Failed password for root from 112.85.42.172 port 63399 ssh2Feb 23 18:31:22 ift sshd\[17702\]: Failed password for root from 112.85.42.172 port 63399 ssh2Feb 23 18:31:35 ift sshd\[17707\]: Failed password for root from 112.85.42.172 port 28679 ssh2Feb 23 18:31:38 ift sshd\[17707\]: Failed password for root from 112.85.42.172 port 28679 ssh2 ... |
2020-02-24 00:33:52 |
117.84.114.21 | attackspam | lfd: (smtpauth) Failed SMTP AUTH login from 117.84.114.21 (21.114.84.117.broad.wx.js.dynamic.163data.com.cn): 5 in the last 3600 secs - Thu Jun 21 02:39:02 2018 |
2020-02-24 01:00:37 |
59.127.100.168 | attackbotsspam | Honeypot attack, port: 81, PTR: 59-127-100-168.HINET-IP.hinet.net. |
2020-02-24 00:54:23 |
138.121.128.19 | attack | Honeypot attack, port: 445, PTR: 19.128.121.138.itechtelecom.net.br. |
2020-02-24 00:56:33 |
218.72.111.233 | attackspambots | lfd: (smtpauth) Failed SMTP AUTH login from 218.72.111.233 (233.111.72.218.broad.hz.zj.dynamic.163data.com.cn): 5 in the last 3600 secs - Thu Jun 21 02:02:43 2018 |
2020-02-24 01:06:28 |