City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.238.134.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35981
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.238.134.139. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 02:53:21 CST 2025
;; MSG SIZE rcvd: 107
139.134.238.18.in-addr.arpa domain name pointer server-18-238-134-139.dfw57.r.cloudfront.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.134.238.18.in-addr.arpa name = server-18-238-134-139.dfw57.r.cloudfront.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 195.234.200.253 | attackbotsspam | [portscan] Port scan |
2019-11-30 20:38:21 |
| 106.13.110.74 | attackbotsspam | Nov 30 08:24:45 root sshd[31114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.110.74 Nov 30 08:24:47 root sshd[31114]: Failed password for invalid user perlik from 106.13.110.74 port 59928 ssh2 Nov 30 08:29:17 root sshd[31205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.110.74 ... |
2019-11-30 20:19:55 |
| 89.248.162.143 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 83 - port: 8089 proto: TCP cat: Misc Attack |
2019-11-30 20:24:50 |
| 151.80.0.51 | attackspambots | WordPress login Brute force / Web App Attack on client site. |
2019-11-30 20:19:31 |
| 101.251.72.205 | attackspam | Oct 9 18:44:01 meumeu sshd[14026]: Failed password for root from 101.251.72.205 port 44900 ssh2 Oct 9 18:48:32 meumeu sshd[14666]: Failed password for root from 101.251.72.205 port 60864 ssh2 ... |
2019-11-30 20:21:09 |
| 137.74.199.180 | attackbots | 1575115197 - 11/30/2019 12:59:57 Host: 137.74.199.180/137.74.199.180 Port: 22 TCP Blocked |
2019-11-30 20:55:15 |
| 167.99.191.54 | attackspam | Nov 30 08:44:21 ws22vmsma01 sshd[163292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.191.54 Nov 30 08:44:24 ws22vmsma01 sshd[163292]: Failed password for invalid user vincent from 167.99.191.54 port 41742 ssh2 ... |
2019-11-30 20:58:05 |
| 116.97.243.142 | attackbotsspam | Unauthorised access (Nov 30) SRC=116.97.243.142 LEN=52 TOS=0x10 PREC=0x20 TTL=110 ID=13809 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Nov 30) SRC=116.97.243.142 LEN=52 TOS=0x10 PREC=0x20 TTL=110 ID=9448 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Nov 28) SRC=116.97.243.142 LEN=52 TOS=0x10 PREC=0x20 TTL=110 ID=29301 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Nov 28) SRC=116.97.243.142 LEN=52 TOS=0x10 PREC=0x20 TTL=110 ID=14848 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Nov 27) SRC=116.97.243.142 LEN=52 TOS=0x10 PREC=0x20 TTL=110 ID=26412 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-30 20:57:39 |
| 111.231.204.127 | attack | Jul 10 01:34:31 meumeu sshd[32684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.204.127 Jul 10 01:34:33 meumeu sshd[32684]: Failed password for invalid user admin from 111.231.204.127 port 59970 ssh2 Jul 10 01:36:56 meumeu sshd[670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.204.127 ... |
2019-11-30 20:44:20 |
| 122.96.92.226 | attackbotsspam | Nov 30 12:25:39 zeus sshd[15543]: Failed password for root from 122.96.92.226 port 37908 ssh2 Nov 30 12:29:34 zeus sshd[15628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.96.92.226 Nov 30 12:29:36 zeus sshd[15628]: Failed password for invalid user betz from 122.96.92.226 port 41486 ssh2 |
2019-11-30 20:50:27 |
| 92.222.84.34 | attack | Repeated failed SSH attempt |
2019-11-30 20:48:23 |
| 130.180.66.98 | attackbotsspam | Nov 30 13:36:59 MK-Soft-VM7 sshd[31390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.180.66.98 Nov 30 13:37:01 MK-Soft-VM7 sshd[31390]: Failed password for invalid user uekusa from 130.180.66.98 port 35794 ssh2 ... |
2019-11-30 20:54:59 |
| 106.13.181.170 | attackbots | Nov 30 08:24:50 vpn01 sshd[12715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.170 Nov 30 08:24:53 vpn01 sshd[12715]: Failed password for invalid user oracle from 106.13.181.170 port 60791 ssh2 ... |
2019-11-30 20:29:15 |
| 103.129.222.135 | attackbots | Nov 30 09:28:38 venus sshd\[3743\]: Invalid user belch from 103.129.222.135 port 35933 Nov 30 09:28:38 venus sshd\[3743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.222.135 Nov 30 09:28:39 venus sshd\[3743\]: Failed password for invalid user belch from 103.129.222.135 port 35933 ssh2 ... |
2019-11-30 20:39:11 |
| 122.154.46.5 | attack | Nov 17 02:25:26 meumeu sshd[24556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.46.5 Nov 17 02:25:28 meumeu sshd[24556]: Failed password for invalid user veronica from 122.154.46.5 port 42894 ssh2 Nov 17 02:29:22 meumeu sshd[25045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.46.5 ... |
2019-11-30 20:34:06 |