City: unknown
Region: unknown
Country: Multicast Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 239.125.136.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50034
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;239.125.136.131.		IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 12:06:33 CST 2025
;; MSG SIZE  rcvd: 108Host 131.136.125.239.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 131.136.125.239.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 167.172.201.254 | attack | Port scan(s) denied | 2020-05-01 02:45:20 | 
| 61.183.52.146 | attackspam | [portscan] tcp/1433 [MsSQL] *(RWIN=1024)(04301449) | 2020-05-01 02:38:18 | 
| 213.226.114.41 | attack | Lines containing failures of 213.226.114.41 Apr 29 20:06:54 kmh-wmh-002-nbg03 sshd[9836]: Invalid user davi from 213.226.114.41 port 47976 Apr 29 20:06:54 kmh-wmh-002-nbg03 sshd[9836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.226.114.41 Apr 29 20:06:55 kmh-wmh-002-nbg03 sshd[9836]: Failed password for invalid user davi from 213.226.114.41 port 47976 ssh2 Apr 29 20:06:56 kmh-wmh-002-nbg03 sshd[9836]: Received disconnect from 213.226.114.41 port 47976:11: Bye Bye [preauth] Apr 29 20:06:56 kmh-wmh-002-nbg03 sshd[9836]: Disconnected from invalid user davi 213.226.114.41 port 47976 [preauth] Apr 29 20:13:13 kmh-wmh-002-nbg03 sshd[10635]: Invalid user loic from 213.226.114.41 port 38910 Apr 29 20:13:13 kmh-wmh-002-nbg03 sshd[10635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.226.114.41 Apr 29 20:13:14 kmh-wmh-002-nbg03 sshd[10635]: Failed password for invalid user loic from 21........ ------------------------------ | 2020-05-01 03:02:43 | 
| 88.142.233.141 | attack | SSH-bruteforce attempts | 2020-05-01 03:17:02 | 
| 139.186.67.159 | attack | Apr 30 14:28:47 mail sshd[3539]: Invalid user test1 from 139.186.67.159 Apr 30 14:28:47 mail sshd[3539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.67.159 Apr 30 14:28:47 mail sshd[3539]: Invalid user test1 from 139.186.67.159 Apr 30 14:28:48 mail sshd[3539]: Failed password for invalid user test1 from 139.186.67.159 port 43440 ssh2 Apr 30 15:01:51 mail sshd[8197]: Invalid user abc from 139.186.67.159 ... | 2020-05-01 02:54:17 | 
| 83.97.20.35 | attackspambots | Port scan(s) denied | 2020-05-01 02:49:33 | 
| 49.174.182.99 | attack | [portscan] tcp/23 [TELNET] *(RWIN=14600)(04301449) | 2020-05-01 02:39:51 | 
| 123.139.42.226 | attackbots | [portscan] tcp/1433 [MsSQL] *(RWIN=8192)(04301449) | 2020-05-01 02:46:13 | 
| 5.54.217.39 | attack | [portscan] tcp/23 [TELNET] *(RWIN=10430)(04301449) | 2020-05-01 02:41:55 | 
| 61.191.55.33 | attackspambots | Found by fail2ban | 2020-05-01 02:55:06 | 
| 14.161.50.104 | attackbots | Invalid user ellis from 14.161.50.104 port 53265 | 2020-05-01 03:13:57 | 
| 40.113.207.209 | attackspam | Repeated RDP login failures. Last user: Martin | 2020-05-01 02:58:05 | 
| 223.149.249.0 | attackspam | 223.149.249.0 - - \[30/Apr/2020:14:25:36 +0200\] "POST /HNAP1/ HTTP/1.0" 301 551 "-" "-" | 2020-05-01 03:09:00 | 
| 191.243.136.250 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found | 2020-05-01 03:16:02 | 
| 51.178.78.153 | attackbots | Port 26 (SMTP) access denied | 2020-05-01 02:39:27 |