City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 215.134.106.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62139
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;215.134.106.99. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 14:34:52 CST 2025
;; MSG SIZE rcvd: 107
Host 99.106.134.215.in-addr.arpa not found: 2(SERVFAIL)
server can't find 215.134.106.99.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 176.107.129.109 | attackspam | 2020-01-29 07:28:56 H=famericana.brasilia.me (famericana-00) [176.107.129.109]:35554 I=[192.147.25.65]:25 F= |
2020-01-30 02:01:38 |
| 52.89.162.95 | attackspambots | 01/29/2020-19:00:47.603758 52.89.162.95 Protocol: 6 SURICATA TLS invalid record/traffic |
2020-01-30 02:15:54 |
| 114.67.74.139 | attackbotsspam | Unauthorized connection attempt detected from IP address 114.67.74.139 to port 2220 [J] |
2020-01-30 01:51:33 |
| 2.24.17.34 | attackbotsspam | 2019-07-07 13:13:22 1hk56g-0006ZJ-9e SMTP connection from \(\[2.24.17.34\]\) \[2.24.17.34\]:34958 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-07 13:13:29 1hk56m-0006ZM-7n SMTP connection from \(\[2.24.17.34\]\) \[2.24.17.34\]:34996 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-07 13:13:34 1hk56r-0006ZR-Fk SMTP connection from \(\[2.24.17.34\]\) \[2.24.17.34\]:35034 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 01:42:07 |
| 104.140.188.6 | attack | Unauthorized connection attempt detected from IP address 104.140.188.6 to port 3389 [J] |
2020-01-30 01:41:50 |
| 2.136.136.109 | attackbotsspam | 2019-10-23 23:28:39 1iNOBK-0001a7-Dj SMTP connection from 109.red-2-136-136.staticip.rima-tde.net \[2.136.136.109\]:48867 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-10-23 23:28:59 1iNOBd-0001aV-Pz SMTP connection from 109.red-2-136-136.staticip.rima-tde.net \[2.136.136.109\]:22496 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-10-23 23:29:13 1iNOBr-0001ao-Ke SMTP connection from 109.red-2-136-136.staticip.rima-tde.net \[2.136.136.109\]:49141 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 02:09:10 |
| 2.138.169.121 | attackbotsspam | 2019-03-11 19:49:29 H=121.red-2-138-169.dynamicip.rima-tde.net \[2.138.169.121\]:37372 I=\[193.107.88.166\]:25 F=\ |
2020-01-30 02:06:31 |
| 40.77.188.108 | attack | Calling not existent HTTP content (400 or 404). |
2020-01-30 02:17:24 |
| 80.252.137.54 | attackspam | Jan 29 18:14:13 server sshd\[1122\]: Invalid user araga from 80.252.137.54 Jan 29 18:14:13 server sshd\[1122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.252.137.54 Jan 29 18:14:14 server sshd\[1122\]: Failed password for invalid user araga from 80.252.137.54 port 37520 ssh2 Jan 29 19:13:13 server sshd\[10113\]: Invalid user bhuvaneshwari from 80.252.137.54 Jan 29 19:13:13 server sshd\[10113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.252.137.54 ... |
2020-01-30 01:53:33 |
| 2.136.177.204 | attackbotsspam | 2019-09-17 06:26:26 1iA54L-0001tG-3G SMTP connection from 204.red-2-136-177.staticip.rima-tde.net \[2.136.177.204\]:60244 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-17 06:26:41 1iA54a-0001tX-68 SMTP connection from 204.red-2-136-177.staticip.rima-tde.net \[2.136.177.204\]:60556 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-17 06:26:55 1iA54n-0001tj-LT SMTP connection from 204.red-2-136-177.staticip.rima-tde.net \[2.136.177.204\]:60665 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 02:07:28 |
| 190.85.171.126 | attackspam | Unauthorized connection attempt detected from IP address 190.85.171.126 to port 2220 [J] |
2020-01-30 02:21:07 |
| 124.120.205.248 | attack | Invalid user admin from 124.120.205.248 port 63802 |
2020-01-30 01:42:29 |
| 2.203.126.110 | attackbots | 2019-09-16 16:44:49 1i9sFE-0002bg-ED SMTP connection from dslb-002-203-126-110.002.203.pools.vodafone-ip.de \[2.203.126.110\]:48839 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-16 16:45:06 1i9sFV-0002dR-5K SMTP connection from dslb-002-203-126-110.002.203.pools.vodafone-ip.de \[2.203.126.110\]:48961 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-16 16:45:13 1i9sFd-0002dl-DP SMTP connection from dslb-002-203-126-110.002.203.pools.vodafone-ip.de \[2.203.126.110\]:49029 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 01:54:08 |
| 103.29.185.143 | attack | 8080/tcp [2020-01-29]1pkt |
2020-01-30 02:02:06 |
| 186.67.248.5 | attack | Jan 29 18:54:34 meumeu sshd[8281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.5 Jan 29 18:54:37 meumeu sshd[8281]: Failed password for invalid user lavit from 186.67.248.5 port 40539 ssh2 Jan 29 19:01:22 meumeu sshd[9527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.5 ... |
2020-01-30 02:08:02 |