City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 167.139.85.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50801
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;167.139.85.14. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 14:28:39 CST 2025
;; MSG SIZE rcvd: 106
Host 14.85.139.167.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 14.85.139.167.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 20.53.9.27 | attackbotsspam | Aug 27 23:30:56 lnxmail61 postfix/smtps/smtpd[15308]: warning: unknown[20.53.9.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-08-28 06:33:17 |
| 187.95.57.68 | attackspam | Aug 27 06:02:23 mail.srvfarm.net postfix/smtps/smtpd[1364785]: warning: 187-95-57-68.vianet.net.br[187.95.57.68]: SASL PLAIN authentication failed: Aug 27 06:02:23 mail.srvfarm.net postfix/smtps/smtpd[1364785]: lost connection after AUTH from 187-95-57-68.vianet.net.br[187.95.57.68] Aug 27 06:05:28 mail.srvfarm.net postfix/smtpd[1379990]: warning: 187-95-57-68.vianet.net.br[187.95.57.68]: SASL PLAIN authentication failed: Aug 27 06:05:28 mail.srvfarm.net postfix/smtpd[1379990]: lost connection after AUTH from 187-95-57-68.vianet.net.br[187.95.57.68] Aug 27 06:11:42 mail.srvfarm.net postfix/smtpd[1379985]: warning: 187-95-57-68.vianet.net.br[187.95.57.68]: SASL PLAIN authentication failed: Aug 27 06:11:42 mail.srvfarm.net postfix/smtpd[1379985]: lost connection after AUTH from 187-95-57-68.vianet.net.br[187.95.57.68] |
2020-08-28 07:07:35 |
| 203.249.17.86 | attack | Aug 27 23:40:48 plg sshd[26959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.249.17.86 Aug 27 23:40:49 plg sshd[26959]: Failed password for invalid user user from 203.249.17.86 port 58458 ssh2 Aug 27 23:44:15 plg sshd[26985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.249.17.86 user=root Aug 27 23:44:17 plg sshd[26985]: Failed password for invalid user root from 203.249.17.86 port 46516 ssh2 Aug 27 23:47:34 plg sshd[27011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.249.17.86 user=root Aug 27 23:47:36 plg sshd[27011]: Failed password for invalid user root from 203.249.17.86 port 34572 ssh2 ... |
2020-08-28 06:41:39 |
| 187.167.65.189 | attack | Automatic report - Port Scan Attack |
2020-08-28 06:47:35 |
| 217.61.104.25 | attack | Trolling for resource vulnerabilities |
2020-08-28 06:56:11 |
| 139.59.40.240 | attackspambots | Aug 27 22:13:10 onepixel sshd[4130541]: Invalid user liam from 139.59.40.240 port 47290 Aug 27 22:13:10 onepixel sshd[4130541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.40.240 Aug 27 22:13:10 onepixel sshd[4130541]: Invalid user liam from 139.59.40.240 port 47290 Aug 27 22:13:11 onepixel sshd[4130541]: Failed password for invalid user liam from 139.59.40.240 port 47290 ssh2 Aug 27 22:17:04 onepixel sshd[4131175]: Invalid user tiptop from 139.59.40.240 port 51396 |
2020-08-28 06:31:38 |
| 181.61.221.93 | attack | Aug 28 01:23:48 journals sshd\[34981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.61.221.93 user=root Aug 28 01:23:50 journals sshd\[34981\]: Failed password for root from 181.61.221.93 port 54410 ssh2 Aug 28 01:26:02 journals sshd\[35179\]: Invalid user student3 from 181.61.221.93 Aug 28 01:26:02 journals sshd\[35179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.61.221.93 Aug 28 01:26:03 journals sshd\[35179\]: Failed password for invalid user student3 from 181.61.221.93 port 56276 ssh2 ... |
2020-08-28 06:30:57 |
| 89.187.168.172 | attackspambots | 0,39-12/07 [bc00/m60] PostRequest-Spammer scoring: brussels |
2020-08-28 06:54:50 |
| 197.51.154.68 | attackspambots | Port probing on unauthorized port 445 |
2020-08-28 07:00:28 |
| 121.122.99.187 | attackbots | Automatic report - Port Scan Attack |
2020-08-28 06:46:04 |
| 188.166.150.17 | attackbots | Aug 28 00:07:22 santamaria sshd\[538\]: Invalid user uru from 188.166.150.17 Aug 28 00:07:22 santamaria sshd\[538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.150.17 Aug 28 00:07:24 santamaria sshd\[538\]: Failed password for invalid user uru from 188.166.150.17 port 53306 ssh2 ... |
2020-08-28 06:55:22 |
| 157.230.125.207 | attackspam | Time: Thu Aug 27 23:17:45 2020 +0200 IP: 157.230.125.207 (DE/Germany/dreamon.pk) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Aug 27 23:05:17 ca-3-ams1 sshd[9798]: Invalid user binh from 157.230.125.207 port 32373 Aug 27 23:05:20 ca-3-ams1 sshd[9798]: Failed password for invalid user binh from 157.230.125.207 port 32373 ssh2 Aug 27 23:14:29 ca-3-ams1 sshd[10400]: Invalid user www-data from 157.230.125.207 port 46913 Aug 27 23:14:31 ca-3-ams1 sshd[10400]: Failed password for invalid user www-data from 157.230.125.207 port 46913 ssh2 Aug 27 23:17:44 ca-3-ams1 sshd[10652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.125.207 user=root |
2020-08-28 06:33:00 |
| 213.195.222.60 | attackspam | Aug 27 06:13:14 mail.srvfarm.net postfix/smtps/smtpd[1382760]: warning: unknown[213.195.222.60]: SASL PLAIN authentication failed: Aug 27 06:13:14 mail.srvfarm.net postfix/smtps/smtpd[1382760]: lost connection after AUTH from unknown[213.195.222.60] Aug 27 06:13:57 mail.srvfarm.net postfix/smtps/smtpd[1382766]: warning: unknown[213.195.222.60]: SASL PLAIN authentication failed: Aug 27 06:13:57 mail.srvfarm.net postfix/smtps/smtpd[1382766]: lost connection after AUTH from unknown[213.195.222.60] Aug 27 06:15:11 mail.srvfarm.net postfix/smtps/smtpd[1382747]: warning: unknown[213.195.222.60]: SASL PLAIN authentication failed: |
2020-08-28 07:03:58 |
| 81.4.109.159 | attackspam | Aug 28 00:19:38 srv-ubuntu-dev3 sshd[64031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.109.159 user=root Aug 28 00:19:40 srv-ubuntu-dev3 sshd[64031]: Failed password for root from 81.4.109.159 port 60278 ssh2 Aug 28 00:22:56 srv-ubuntu-dev3 sshd[64420]: Invalid user hf from 81.4.109.159 Aug 28 00:22:56 srv-ubuntu-dev3 sshd[64420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.109.159 Aug 28 00:22:56 srv-ubuntu-dev3 sshd[64420]: Invalid user hf from 81.4.109.159 Aug 28 00:22:58 srv-ubuntu-dev3 sshd[64420]: Failed password for invalid user hf from 81.4.109.159 port 44974 ssh2 Aug 28 00:26:17 srv-ubuntu-dev3 sshd[64819]: Invalid user se from 81.4.109.159 Aug 28 00:26:17 srv-ubuntu-dev3 sshd[64819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.109.159 Aug 28 00:26:17 srv-ubuntu-dev3 sshd[64819]: Invalid user se from 81.4.109.159 Aug 28 00:26:19 ... |
2020-08-28 06:34:03 |
| 95.169.5.166 | attackspambots | 2020-08-27T21:10:31.837768abusebot-2.cloudsearch.cf sshd[10639]: Invalid user sungki from 95.169.5.166 port 47850 2020-08-27T21:10:31.845296abusebot-2.cloudsearch.cf sshd[10639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.169.5.166.16clouds.com 2020-08-27T21:10:31.837768abusebot-2.cloudsearch.cf sshd[10639]: Invalid user sungki from 95.169.5.166 port 47850 2020-08-27T21:10:33.781094abusebot-2.cloudsearch.cf sshd[10639]: Failed password for invalid user sungki from 95.169.5.166 port 47850 ssh2 2020-08-27T21:19:27.374912abusebot-2.cloudsearch.cf sshd[10652]: Invalid user patrick from 95.169.5.166 port 39198 2020-08-27T21:19:27.380562abusebot-2.cloudsearch.cf sshd[10652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.169.5.166.16clouds.com 2020-08-27T21:19:27.374912abusebot-2.cloudsearch.cf sshd[10652]: Invalid user patrick from 95.169.5.166 port 39198 2020-08-27T21:19:29.566490abusebot-2.cloudsea ... |
2020-08-28 06:40:53 |