City: unknown
Region: unknown
Country: Argentina
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.6.139.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;181.6.139.94. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 15:24:17 CST 2025
;; MSG SIZE rcvd: 105
94.139.6.181.in-addr.arpa domain name pointer host94.181-6-139.telecom.net.ar.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
94.139.6.181.in-addr.arpa name = host94.181-6-139.telecom.net.ar.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 14.29.174.142 | attack | Sep 13 14:22:33 saschabauer sshd[31927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.174.142 Sep 13 14:22:35 saschabauer sshd[31927]: Failed password for invalid user webserver from 14.29.174.142 port 35542 ssh2 |
2019-09-13 20:24:04 |
| 206.189.47.172 | attackbotsspam | Automatic report - Banned IP Access |
2019-09-13 20:45:17 |
| 164.132.207.231 | attack | Sep 13 12:24:26 ip-172-31-62-245 sshd\[15948\]: Failed password for www-data from 164.132.207.231 port 43208 ssh2\ Sep 13 12:28:35 ip-172-31-62-245 sshd\[15969\]: Invalid user minecraft from 164.132.207.231\ Sep 13 12:28:37 ip-172-31-62-245 sshd\[15969\]: Failed password for invalid user minecraft from 164.132.207.231 port 33572 ssh2\ Sep 13 12:32:22 ip-172-31-62-245 sshd\[15997\]: Invalid user student from 164.132.207.231\ Sep 13 12:32:24 ip-172-31-62-245 sshd\[15997\]: Failed password for invalid user student from 164.132.207.231 port 47716 ssh2\ |
2019-09-13 20:41:38 |
| 74.80.21.44 | attack | Unauthorized connection attempt from IP address 74.80.21.44 on Port 445(SMB) |
2019-09-13 20:18:47 |
| 144.217.79.233 | attackbotsspam | Sep 13 14:05:26 eventyay sshd[327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.79.233 Sep 13 14:05:29 eventyay sshd[327]: Failed password for invalid user nagios from 144.217.79.233 port 59576 ssh2 Sep 13 14:09:38 eventyay sshd[398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.79.233 ... |
2019-09-13 20:10:53 |
| 91.149.172.7 | attackspambots | Unauthorised access (Sep 13) SRC=91.149.172.7 LEN=40 TTL=246 ID=10403 TCP DPT=445 WINDOW=1024 SYN |
2019-09-13 20:36:04 |
| 209.173.253.226 | attack | Sep 13 08:14:37 TORMINT sshd\[19845\]: Invalid user mumbleserver from 209.173.253.226 Sep 13 08:14:37 TORMINT sshd\[19845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.173.253.226 Sep 13 08:14:39 TORMINT sshd\[19845\]: Failed password for invalid user mumbleserver from 209.173.253.226 port 41896 ssh2 ... |
2019-09-13 20:19:05 |
| 60.51.82.7 | attackspam | Automatic report - Port Scan Attack |
2019-09-13 20:37:29 |
| 92.194.116.109 | attackspam | Sep 13 13:05:18 xxx sshd[29683]: Invalid user pi from 92.194.116.109 port 51466 Sep 13 13:05:18 xxx sshd[29683]: Failed password for invalid user pi from 92.194.116.109 port 51466 ssh2 Sep 13 13:05:18 xxx sshd[29682]: Invalid user pi from 92.194.116.109 port 51464 Sep 13 13:05:18 xxx sshd[29683]: Connection closed by 92.194.116.109 port 51466 [preauth] Sep 13 13:05:18 xxx sshd[29682]: Failed password for invalid user pi from 92.194.116.109 port 51464 ssh2 Sep 13 13:05:18 xxx sshd[29682]: Connection closed by 92.194.116.109 port 51464 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=92.194.116.109 |
2019-09-13 20:48:21 |
| 217.112.128.43 | attackbotsspam | Sent Mail to address hacked/leaked/bought from crystalproductions.cz between 2011 and 2018 |
2019-09-13 20:44:57 |
| 37.142.43.168 | attack | Sep 13 14:27:38 markkoudstaal sshd[17911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.142.43.168 Sep 13 14:27:40 markkoudstaal sshd[17911]: Failed password for invalid user 210 from 37.142.43.168 port 36360 ssh2 Sep 13 14:32:46 markkoudstaal sshd[18375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.142.43.168 |
2019-09-13 20:53:28 |
| 218.92.0.192 | attack | Sep 13 14:12:59 core sshd[25833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.192 user=root Sep 13 14:13:01 core sshd[25833]: Failed password for root from 218.92.0.192 port 38498 ssh2 ... |
2019-09-13 20:32:39 |
| 119.93.245.103 | attack | Unauthorized connection attempt from IP address 119.93.245.103 on Port 445(SMB) |
2019-09-13 20:39:10 |
| 211.23.61.194 | attack | Sep 13 08:59:27 TORMINT sshd\[24175\]: Invalid user hadoop from 211.23.61.194 Sep 13 08:59:27 TORMINT sshd\[24175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.23.61.194 Sep 13 08:59:29 TORMINT sshd\[24175\]: Failed password for invalid user hadoop from 211.23.61.194 port 36706 ssh2 ... |
2019-09-13 20:59:45 |
| 45.173.12.18 | attackspambots | Spam |
2019-09-13 20:52:46 |