City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 205.252.138.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;205.252.138.34. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 15:17:15 CST 2025
;; MSG SIZE rcvd: 107
Host 34.138.252.205.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 34.138.252.205.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.68.138.143 | attack | Invalid user csgoserver from 51.68.138.143 port 54598 |
2019-07-13 22:05:07 |
| 190.128.159.118 | attackbotsspam | Invalid user postgres from 190.128.159.118 port 39218 |
2019-07-13 22:24:54 |
| 210.216.30.140 | attack | Invalid user mail1 from 210.216.30.140 port 39636 |
2019-07-13 22:18:20 |
| 41.65.224.98 | attackspam | Invalid user blower from 41.65.224.98 port 44710 |
2019-07-13 22:08:13 |
| 119.201.214.130 | attackspam | Jul 13 14:10:53 icinga sshd[4808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.201.214.130 Jul 13 14:10:55 icinga sshd[4808]: Failed password for invalid user aldi from 119.201.214.130 port 50760 ssh2 ... |
2019-07-13 22:49:08 |
| 181.49.117.159 | attack | Invalid user samba1 from 181.49.117.159 port 53304 |
2019-07-13 22:28:54 |
| 205.185.118.61 | attackbots | Invalid user admin from 205.185.118.61 port 40824 |
2019-07-13 22:20:20 |
| 119.1.238.156 | attackspambots | Jul 13 15:02:39 server01 sshd\[29998\]: Invalid user ircbot from 119.1.238.156 Jul 13 15:02:39 server01 sshd\[29998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.1.238.156 Jul 13 15:02:42 server01 sshd\[29998\]: Failed password for invalid user ircbot from 119.1.238.156 port 41341 ssh2 ... |
2019-07-13 22:50:12 |
| 157.230.237.76 | attackbotsspam | FTP Brute-Force reported by Fail2Ban |
2019-07-13 22:39:16 |
| 178.189.37.231 | attack | Invalid user admin from 178.189.37.231 port 56512 |
2019-07-13 22:30:48 |
| 118.25.92.221 | attack | Invalid user apptest from 118.25.92.221 port 37946 |
2019-07-13 22:50:48 |
| 197.253.6.249 | attack | Jul 13 09:01:51 aat-srv002 sshd[11250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.253.6.249 Jul 13 09:01:53 aat-srv002 sshd[11250]: Failed password for invalid user rodrigo from 197.253.6.249 port 60829 ssh2 Jul 13 09:07:34 aat-srv002 sshd[11362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.253.6.249 Jul 13 09:07:36 aat-srv002 sshd[11362]: Failed password for invalid user server from 197.253.6.249 port 32999 ssh2 ... |
2019-07-13 22:22:59 |
| 103.39.133.110 | attackspam | Invalid user alberto from 103.39.133.110 port 46412 |
2019-07-13 21:51:57 |
| 111.231.87.204 | attackbotsspam | Invalid user redis from 111.231.87.204 port 37360 |
2019-07-13 22:54:34 |
| 116.68.127.9 | attackspambots | Jul 13 10:42:53 plusreed sshd[3660]: Invalid user search from 116.68.127.9 ... |
2019-07-13 22:52:14 |