City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 205.80.30.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34003
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;205.80.30.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 01:13:07 CST 2025
;; MSG SIZE rcvd: 106
b'Host 139.30.80.205.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 205.80.30.139.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.38.235.100 | attackbots | Jan 29 12:38:53 mail sshd[1189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.235.100 Jan 29 12:38:54 mail sshd[1189]: Failed password for invalid user maheepati from 51.38.235.100 port 37472 ssh2 Jan 29 12:41:39 mail sshd[2053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.235.100 Jan 29 12:41:42 mail sshd[2053]: Failed password for invalid user devamati from 51.38.235.100 port 51604 ssh2 |
2020-01-30 02:28:50 |
| 104.140.188.54 | attack | Unauthorized connection attempt detected from IP address 104.140.188.54 to port 5060 [J] |
2020-01-30 01:58:51 |
| 103.29.185.143 | attack | 8080/tcp [2020-01-29]1pkt |
2020-01-30 02:02:06 |
| 1.52.113.182 | attack | Unauthorized connection attempt detected from IP address 1.52.113.182 to port 23 [J] |
2020-01-30 02:01:20 |
| 80.252.137.54 | attackspam | Jan 29 18:14:13 server sshd\[1122\]: Invalid user araga from 80.252.137.54 Jan 29 18:14:13 server sshd\[1122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.252.137.54 Jan 29 18:14:14 server sshd\[1122\]: Failed password for invalid user araga from 80.252.137.54 port 37520 ssh2 Jan 29 19:13:13 server sshd\[10113\]: Invalid user bhuvaneshwari from 80.252.137.54 Jan 29 19:13:13 server sshd\[10113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.252.137.54 ... |
2020-01-30 01:53:33 |
| 2.110.192.204 | attack | 2019-03-15 16:15:37 H=0155500291.0.fullrate.ninja \[2.110.192.204\]:29237 I=\[193.107.88.166\]:25 F=\ |
2020-01-30 02:24:41 |
| 199.253.10.110 | attackbots | 2019-10-23 23:29:06 1iNOBk-0001ae-Va SMTP connection from \(110.10.253.199.c.cable.oricom.ca\) \[199.253.10.110\]:23366 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-10-23 23:29:28 1iNOC6-0001bK-V2 SMTP connection from \(110.10.253.199.c.cable.oricom.ca\) \[199.253.10.110\]:23583 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-10-23 23:29:46 1iNOCP-0001bX-BG SMTP connection from \(110.10.253.199.c.cable.oricom.ca\) \[199.253.10.110\]:23738 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 02:26:27 |
| 200.251.42.78 | attackbotsspam | Unauthorized connection attempt from IP address 200.251.42.78 on Port 445(SMB) |
2020-01-30 02:10:14 |
| 2.134.32.134 | attackspambots | 2019-10-23 19:56:55 1iNKsQ-000421-Qp SMTP connection from \(2.134.32.134.megaline.telecom.kz\) \[2.134.32.134\]:19700 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-10-23 19:57:02 1iNKsX-00042A-CO SMTP connection from \(2.134.32.134.megaline.telecom.kz\) \[2.134.32.134\]:19756 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-10-23 19:57:07 1iNKsc-00042j-JG SMTP connection from \(2.134.32.134.megaline.telecom.kz\) \[2.134.32.134\]:19784 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 02:09:42 |
| 2.184.104.162 | attackspam | 2019-01-29 20:06:47 1goYid-0003jn-7n SMTP connection from \(\[2.184.104.162\]\) \[2.184.104.162\]:26627 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-01-29 20:07:22 1goYjB-0003kh-M1 SMTP connection from \(\[2.184.104.162\]\) \[2.184.104.162\]:26643 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-01-29 20:07:43 1goYjX-0003lK-DC SMTP connection from \(\[2.184.104.162\]\) \[2.184.104.162\]:26550 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 02:00:23 |
| 199.189.27.123 | attackspam | 2019-03-03 15:30:46 1h0S8c-0000eh-2T SMTP connection from right.hasanhost.com \(right.styledkit.icu\) \[199.189.27.123\]:54208 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-03 15:33:33 1h0SBJ-0000iT-2Q SMTP connection from right.hasanhost.com \(right.styledkit.icu\) \[199.189.27.123\]:43079 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-03 15:33:57 1h0SBg-0000j6-Rv SMTP connection from right.hasanhost.com \(right.styledkit.icu\) \[199.189.27.123\]:41438 I=\[193.107.90.29\]:25 closed by DROP in ACL 2019-03-07 06:33:49 1h1lfB-0002Kk-7S SMTP connection from right.hasanhost.com \(right.alibabaquote.icu\) \[199.189.27.123\]:56526 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-07 06:35:43 1h1lh1-0002Op-HT SMTP connection from right.hasanhost.com \(right.alibabaquote.icu\) \[199.189.27.123\]:37902 I=\[193.107.90.29\]:25 closed by DROP in ACL 2019-03-07 06:36:15 1h1lhW-0002Pp-Ux SMTP connection from right.hasanhost.com \(right.alibabaquote.icu\) \[199.189.27.123\]:43282 I ... |
2020-01-30 02:35:04 |
| 120.55.70.28 | attackspambots | 445/tcp [2020-01-29]1pkt |
2020-01-30 02:36:00 |
| 121.8.160.18 | attack | Unauthorized connection attempt detected from IP address 121.8.160.18 to port 1433 [T] |
2020-01-30 02:37:32 |
| 199.189.27.126 | attackspam | 2019-03-13 03:34:01 1h3tiS-0000qR-Qo SMTP connection from dickey.hasanhost.com \(dickey.areeeee.icu\) \[199.189.27.126\]:53884 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-13 03:35:49 1h3tkC-0000ub-Vu SMTP connection from dickey.hasanhost.com \(dickey.areeeee.icu\) \[199.189.27.126\]:40970 I=\[193.107.90.29\]:25 closed by DROP in ACL 2019-03-13 03:36:00 1h3tkO-0000uo-6C SMTP connection from dickey.hasanhost.com \(dickey.areeeee.icu\) \[199.189.27.126\]:52195 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-20 06:44:54 1h6U22-0006rP-D7 SMTP connection from dickey.hasanhost.com \(dickey.bekamabc.icu\) \[199.189.27.126\]:33489 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-20 06:45:44 1h6U2q-0006tU-LM SMTP connection from dickey.hasanhost.com \(dickey.bekamabc.icu\) \[199.189.27.126\]:41351 I=\[193.107.90.29\]:25 closed by DROP in ACL 2019-03-20 06:45:55 1h6U31-0006tk-ML SMTP connection from dickey.hasanhost.com \(dickey.bekamabc.icu\) \[199.189.27.126\]:60446 I=\[193 ... |
2020-01-30 02:31:42 |
| 177.155.36.44 | attackspambots | Unauthorized connection attempt detected from IP address 177.155.36.44 to port 9000 [J] |
2020-01-30 02:19:06 |