City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 241.94.138.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33789
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;241.94.138.213. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 14:48:39 CST 2025
;; MSG SIZE rcvd: 107
Host 213.138.94.241.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 213.138.94.241.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 154.0.173.166 | attack | Unauthorized connection attempt from IP address 154.0.173.166 on Port 3389(RDP) |
2019-12-27 07:45:05 |
| 40.73.100.56 | attackbots | Dec 27 00:35:29 localhost sshd\[3484\]: Invalid user needs from 40.73.100.56 port 46728 Dec 27 00:35:29 localhost sshd\[3484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.100.56 Dec 27 00:35:31 localhost sshd\[3484\]: Failed password for invalid user needs from 40.73.100.56 port 46728 ssh2 |
2019-12-27 07:51:25 |
| 218.92.0.135 | attack | Dec 27 00:58:13 sd-53420 sshd\[4271\]: User root from 218.92.0.135 not allowed because none of user's groups are listed in AllowGroups Dec 27 00:58:13 sd-53420 sshd\[4271\]: Failed none for invalid user root from 218.92.0.135 port 41152 ssh2 Dec 27 00:58:13 sd-53420 sshd\[4271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.135 user=root Dec 27 00:58:15 sd-53420 sshd\[4271\]: Failed password for invalid user root from 218.92.0.135 port 41152 ssh2 Dec 27 00:58:18 sd-53420 sshd\[4271\]: Failed password for invalid user root from 218.92.0.135 port 41152 ssh2 ... |
2019-12-27 08:11:01 |
| 163.172.117.190 | attackspam | firewall-block, port(s): 5060/udp |
2019-12-27 07:53:44 |
| 36.99.169.195 | attack | Dec 26 18:58:44 : SSH login attempts with invalid user |
2019-12-27 08:01:42 |
| 190.144.216.206 | attack | Unauthorized connection attempt from IP address 190.144.216.206 on Port 445(SMB) |
2019-12-27 07:53:13 |
| 218.92.0.138 | attackbotsspam | Dec 27 01:10:10 localhost sshd\[7069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138 user=root Dec 27 01:10:12 localhost sshd\[7069\]: Failed password for root from 218.92.0.138 port 44900 ssh2 Dec 27 01:10:16 localhost sshd\[7069\]: Failed password for root from 218.92.0.138 port 44900 ssh2 |
2019-12-27 08:14:29 |
| 189.32.230.150 | attack | 1577400802 - 12/26/2019 23:53:22 Host: 189.32.230.150/189.32.230.150 Port: 445 TCP Blocked |
2019-12-27 07:59:16 |
| 49.88.112.59 | attack | 2019-12-27T01:12:08.839858vps751288.ovh.net sshd\[3377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.59 user=root 2019-12-27T01:12:10.680360vps751288.ovh.net sshd\[3377\]: Failed password for root from 49.88.112.59 port 58304 ssh2 2019-12-27T01:12:13.839478vps751288.ovh.net sshd\[3377\]: Failed password for root from 49.88.112.59 port 58304 ssh2 2019-12-27T01:12:17.216976vps751288.ovh.net sshd\[3377\]: Failed password for root from 49.88.112.59 port 58304 ssh2 2019-12-27T01:12:20.335009vps751288.ovh.net sshd\[3377\]: Failed password for root from 49.88.112.59 port 58304 ssh2 |
2019-12-27 08:20:08 |
| 201.55.126.57 | attackbotsspam | Dec 27 00:53:03 SilenceServices sshd[24711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.126.57 Dec 27 00:53:05 SilenceServices sshd[24711]: Failed password for invalid user kestell from 201.55.126.57 port 43706 ssh2 Dec 27 00:56:19 SilenceServices sshd[25602]: Failed password for root from 201.55.126.57 port 33635 ssh2 |
2019-12-27 08:14:59 |
| 46.38.144.57 | attackspam | Dec 27 00:36:11 ns3367391 postfix/smtpd[11218]: warning: unknown[46.38.144.57]: SASL LOGIN authentication failed: authentication failure Dec 27 00:37:36 ns3367391 postfix/smtpd[11218]: warning: unknown[46.38.144.57]: SASL LOGIN authentication failed: authentication failure ... |
2019-12-27 07:45:32 |
| 91.195.136.157 | attack | 1577400314 - 12/26/2019 23:45:14 Host: 91.195.136.157/91.195.136.157 Port: 445 TCP Blocked |
2019-12-27 07:58:45 |
| 89.248.167.131 | attackspam | " " |
2019-12-27 08:18:07 |
| 114.186.117.167 | attackbotsspam | --- report --- Dec 26 19:38:24 sshd: Connection from 114.186.117.167 port 53570 |
2019-12-27 07:57:51 |
| 119.29.53.107 | attackbots | Dec 27 00:51:44 sso sshd[6460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.53.107 Dec 27 00:51:46 sso sshd[6460]: Failed password for invalid user nonorin from 119.29.53.107 port 46927 ssh2 ... |
2019-12-27 08:04:11 |