City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.139.93.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2289
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.139.93.98. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 05:31:36 CST 2025
;; MSG SIZE rcvd: 106
b'Host 98.93.139.169.in-addr.arpa. not found: 3(NXDOMAIN)
'
server can't find 169.139.93.98.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 198.199.83.174 | attackspambots | Jun 9 14:14:02 dignus sshd[4847]: Failed password for root from 198.199.83.174 port 59060 ssh2 Jun 9 14:17:47 dignus sshd[5235]: Invalid user admin from 198.199.83.174 port 54254 Jun 9 14:17:47 dignus sshd[5235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.83.174 Jun 9 14:17:50 dignus sshd[5235]: Failed password for invalid user admin from 198.199.83.174 port 54254 ssh2 Jun 9 14:21:21 dignus sshd[5568]: Invalid user cmschine from 198.199.83.174 port 49450 ... |
2020-06-10 06:40:51 |
| 122.114.247.244 | attack | Jun 9 23:21:14 sd1 sshd[2789]: Invalid user llin from 122.114.247.244 Jun 9 23:21:14 sd1 sshd[2789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.247.244 Jun 9 23:21:16 sd1 sshd[2789]: Failed password for invalid user llin from 122.114.247.244 port 35712 ssh2 Jun 9 23:43:52 sd1 sshd[3418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.247.244 user=r.r Jun 9 23:43:54 sd1 sshd[3418]: Failed password for r.r from 122.114.247.244 port 47876 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=122.114.247.244 |
2020-06-10 06:45:12 |
| 45.248.71.169 | attackspam | Jun 10 00:25:48 inter-technics sshd[18932]: Invalid user monitor from 45.248.71.169 port 42408 Jun 10 00:25:48 inter-technics sshd[18932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.71.169 Jun 10 00:25:48 inter-technics sshd[18932]: Invalid user monitor from 45.248.71.169 port 42408 Jun 10 00:25:50 inter-technics sshd[18932]: Failed password for invalid user monitor from 45.248.71.169 port 42408 ssh2 Jun 10 00:31:05 inter-technics sshd[19349]: Invalid user skynet from 45.248.71.169 port 45262 ... |
2020-06-10 06:39:58 |
| 195.54.160.166 | attack | Jun 10 01:22:34 debian kernel: [643909.610813] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=195.54.160.166 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=17797 PROTO=TCP SPT=55582 DPT=28129 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-10 06:33:04 |
| 49.235.29.226 | attackbots | Jun 9 16:18:30 mail sshd\[35436\]: Invalid user 2k17 from 49.235.29.226 Jun 9 16:18:30 mail sshd\[35436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.29.226 ... |
2020-06-10 06:33:23 |
| 222.186.52.39 | attack | Jun 10 00:01:33 vmi345603 sshd[6348]: Failed password for root from 222.186.52.39 port 53011 ssh2 Jun 10 00:01:36 vmi345603 sshd[6348]: Failed password for root from 222.186.52.39 port 53011 ssh2 ... |
2020-06-10 06:14:37 |
| 118.24.114.205 | attackspambots | Jun 9 23:19:04 h1745522 sshd[29224]: Invalid user 123 from 118.24.114.205 port 44706 Jun 9 23:19:04 h1745522 sshd[29224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.114.205 Jun 9 23:19:04 h1745522 sshd[29224]: Invalid user 123 from 118.24.114.205 port 44706 Jun 9 23:19:06 h1745522 sshd[29224]: Failed password for invalid user 123 from 118.24.114.205 port 44706 ssh2 Jun 9 23:23:25 h1745522 sshd[29473]: Invalid user call from 118.24.114.205 port 38134 Jun 9 23:23:25 h1745522 sshd[29473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.114.205 Jun 9 23:23:25 h1745522 sshd[29473]: Invalid user call from 118.24.114.205 port 38134 Jun 9 23:23:26 h1745522 sshd[29473]: Failed password for invalid user call from 118.24.114.205 port 38134 ssh2 Jun 9 23:27:39 h1745522 sshd[29747]: Invalid user letmein123 from 118.24.114.205 port 59788 ... |
2020-06-10 06:27:33 |
| 85.248.227.164 | attackspambots | CMS (WordPress or Joomla) login attempt. |
2020-06-10 06:42:00 |
| 24.227.134.59 | attackspam | SMB Server BruteForce Attack |
2020-06-10 06:39:03 |
| 79.127.48.141 | attackspam | bruteforce detected |
2020-06-10 06:38:14 |
| 150.158.188.241 | attackbots | SASL PLAIN auth failed: ruser=... |
2020-06-10 06:13:32 |
| 195.54.166.128 | attackspambots | SmallBizIT.US 6 packets to tcp(3416,3428,3491,3528,3533,3584) |
2020-06-10 06:33:51 |
| 103.253.42.59 | attack | [2020-06-09 17:49:07] NOTICE[1288][C-00002458] chan_sip.c: Call from '' (103.253.42.59:60394) to extension '0002146423112910' rejected because extension not found in context 'public'. [2020-06-09 17:49:07] SECURITY[1303] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-09T17:49:07.809-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0002146423112910",SessionID="0x7f4d742d3bb8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.253.42.59/60394",ACLName="no_extension_match" [2020-06-09 17:49:46] NOTICE[1288][C-00002459] chan_sip.c: Call from '' (103.253.42.59:53445) to extension '00146423112910' rejected because extension not found in context 'public'. [2020-06-09 17:49:46] SECURITY[1303] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-09T17:49:46.314-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00146423112910",SessionID="0x7f4d742d3bb8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/ ... |
2020-06-10 06:08:20 |
| 190.196.226.172 | attack | (smtpauth) Failed SMTP AUTH login from 190.196.226.172 (AR/Argentina/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-10 00:48:18 plain authenticator failed for ([190.196.226.172]) [190.196.226.172]: 535 Incorrect authentication data (set_id=info@kooshanetesal.com) |
2020-06-10 06:43:03 |
| 142.93.150.175 | attackbots | Jun 9 23:07:02 cdc sshd[4074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.150.175 Jun 9 23:07:05 cdc sshd[4074]: Failed password for invalid user junshang from 142.93.150.175 port 48772 ssh2 |
2020-06-10 06:26:45 |