City: Oakland
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.148.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37063
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.148.152. IN A
;; AUTHORITY SECTION:
. 389 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022062800 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 29 00:33:16 CST 2022
;; MSG SIZE rcvd: 108
152.148.229.169.in-addr.arpa domain name pointer fixed-169-229-148-152.oor.berkeley.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
152.148.229.169.in-addr.arpa name = fixed-169-229-148-152.oor.berkeley.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
114.226.218.255 | attack | Automatic report - Port Scan Attack |
2020-03-01 07:23:19 |
141.98.10.137 | attack | 2020-03-01 00:02:04 dovecot_login authenticator failed for \(User\) \[141.98.10.137\]: 535 Incorrect authentication data \(set_id=solutions@no-server.de\) 2020-03-01 00:05:45 dovecot_login authenticator failed for \(User\) \[141.98.10.137\]: 535 Incorrect authentication data \(set_id=guiness\) 2020-03-01 00:07:37 dovecot_login authenticator failed for \(User\) \[141.98.10.137\]: 535 Incorrect authentication data \(set_id=solutions@no-server.de\) 2020-03-01 00:08:35 dovecot_login authenticator failed for \(User\) \[141.98.10.137\]: 535 Incorrect authentication data \(set_id=guiness\) 2020-03-01 00:08:41 dovecot_login authenticator failed for \(User\) \[141.98.10.137\]: 535 Incorrect authentication data \(set_id=guiness\) 2020-03-01 00:08:41 dovecot_login authenticator failed for \(User\) \[141.98.10.137\]: 535 Incorrect authentication data \(set_id=guiness\) ... |
2020-03-01 07:24:28 |
49.233.141.224 | attackspam | Invalid user zabbix from 49.233.141.224 port 48136 |
2020-03-01 07:14:15 |
188.166.229.205 | attackbotsspam | Mar 1 04:29:55 gw1 sshd[15663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.229.205 Mar 1 04:29:57 gw1 sshd[15663]: Failed password for invalid user user from 188.166.229.205 port 41457 ssh2 ... |
2020-03-01 07:45:45 |
193.56.28.239 | attack | 2020-02-29T23:49:54.428717www postfix/smtpd[27703]: warning: unknown[193.56.28.239]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-02-29T23:50:02.342555www postfix/smtpd[27703]: warning: unknown[193.56.28.239]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-02-29T23:50:14.223940www postfix/smtpd[27703]: warning: unknown[193.56.28.239]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-03-01 07:31:47 |
185.141.213.134 | attackspam | Feb 29 22:59:26 localhost sshd[72894]: Invalid user zhangkun from 185.141.213.134 port 60304 Feb 29 22:59:26 localhost sshd[72894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.141.213.134 Feb 29 22:59:26 localhost sshd[72894]: Invalid user zhangkun from 185.141.213.134 port 60304 Feb 29 22:59:29 localhost sshd[72894]: Failed password for invalid user zhangkun from 185.141.213.134 port 60304 ssh2 Feb 29 23:08:13 localhost sshd[73802]: Invalid user cisco from 185.141.213.134 port 47693 ... |
2020-03-01 07:15:06 |
112.85.42.194 | attackbots | Feb 29 23:50:12 srv206 sshd[32151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.194 user=root Feb 29 23:50:14 srv206 sshd[32151]: Failed password for root from 112.85.42.194 port 12944 ssh2 ... |
2020-03-01 07:32:12 |
51.38.49.140 | attackbotsspam | Invalid user identd from 51.38.49.140 port 39952 |
2020-03-01 07:19:05 |
178.62.64.107 | attackspambots | "SSH brute force auth login attempt." |
2020-03-01 07:07:48 |
180.118.38.16 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-03-01 07:21:13 |
180.138.16.152 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-03-01 07:15:35 |
148.70.204.190 | attackbots | Feb 29 13:21:59 hpm sshd\[14568\]: Invalid user sake from 148.70.204.190 Feb 29 13:21:59 hpm sshd\[14568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.204.190 Feb 29 13:22:01 hpm sshd\[14568\]: Failed password for invalid user sake from 148.70.204.190 port 48604 ssh2 Feb 29 13:29:54 hpm sshd\[15162\]: Invalid user server from 148.70.204.190 Feb 29 13:29:54 hpm sshd\[15162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.204.190 |
2020-03-01 07:33:29 |
49.233.81.224 | attack | Invalid user tester from 49.233.81.224 port 40458 |
2020-03-01 07:41:54 |
180.140.177.10 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-03-01 07:08:09 |
1.9.128.17 | attackspam | Feb 29 23:37:31 server sshd[2115059]: Failed password for invalid user batch from 1.9.128.17 port 46815 ssh2 Feb 29 23:43:14 server sshd[2124386]: Failed password for invalid user xxx from 1.9.128.17 port 3081 ssh2 Feb 29 23:50:32 server sshd[2136009]: Failed password for invalid user demo from 1.9.128.17 port 57412 ssh2 |
2020-03-01 07:18:27 |