City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 243.138.107.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;243.138.107.140. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400
;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 09:45:41 CST 2025
;; MSG SIZE rcvd: 108
Host 140.107.138.243.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 140.107.138.243.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 193.112.16.245 | attack | May 14 08:12:32 vps647732 sshd[29866]: Failed password for ubuntu from 193.112.16.245 port 53526 ssh2 May 14 08:16:09 vps647732 sshd[29922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.16.245 ... |
2020-05-14 14:31:34 |
| 106.13.227.104 | attackbots | May 14 05:42:19 ip-172-31-62-245 sshd\[31746\]: Invalid user mr from 106.13.227.104\ May 14 05:42:22 ip-172-31-62-245 sshd\[31746\]: Failed password for invalid user mr from 106.13.227.104 port 39748 ssh2\ May 14 05:44:02 ip-172-31-62-245 sshd\[31765\]: Invalid user elcabo from 106.13.227.104\ May 14 05:44:04 ip-172-31-62-245 sshd\[31765\]: Failed password for invalid user elcabo from 106.13.227.104 port 57194 ssh2\ May 14 05:45:46 ip-172-31-62-245 sshd\[31796\]: Invalid user usu\\303\\241rio from 106.13.227.104\ |
2020-05-14 14:56:02 |
| 106.54.155.35 | attackspambots | Bruteforce detected by fail2ban |
2020-05-14 14:49:57 |
| 111.229.34.121 | attackspambots | 2020-05-14T08:03:49.618469sd-86998 sshd[5789]: Invalid user ods from 111.229.34.121 port 53166 2020-05-14T08:03:49.625684sd-86998 sshd[5789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.34.121 2020-05-14T08:03:49.618469sd-86998 sshd[5789]: Invalid user ods from 111.229.34.121 port 53166 2020-05-14T08:03:51.848060sd-86998 sshd[5789]: Failed password for invalid user ods from 111.229.34.121 port 53166 ssh2 2020-05-14T08:07:56.947220sd-86998 sshd[6350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.34.121 user=root 2020-05-14T08:07:59.746480sd-86998 sshd[6350]: Failed password for root from 111.229.34.121 port 44906 ssh2 ... |
2020-05-14 14:58:56 |
| 103.129.220.40 | attackbots | $f2bV_matches |
2020-05-14 14:38:40 |
| 146.88.240.4 | attack | 05/14/2020-02:52:01.473427 146.88.240.4 Protocol: 17 ET DROP Dshield Block Listed Source group 1 |
2020-05-14 14:57:42 |
| 106.12.139.149 | attack | 2020-05-14T07:11:13.569671 sshd[4146]: Invalid user user2 from 106.12.139.149 port 35314 2020-05-14T07:11:13.585700 sshd[4146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.139.149 2020-05-14T07:11:13.569671 sshd[4146]: Invalid user user2 from 106.12.139.149 port 35314 2020-05-14T07:11:15.541463 sshd[4146]: Failed password for invalid user user2 from 106.12.139.149 port 35314 ssh2 ... |
2020-05-14 14:24:41 |
| 41.139.248.205 | attack | 2020-05-13T21:52:15.578368linuxbox-skyline sshd[157372]: Invalid user dircreate from 41.139.248.205 port 54691 ... |
2020-05-14 14:17:37 |
| 123.231.106.70 | attackbotsspam | GET /wp-login.php HTTP/1.1 |
2020-05-14 14:35:57 |
| 185.143.75.81 | attackspam | Rude login attack (563 tries in 1d) |
2020-05-14 14:27:34 |
| 51.83.77.93 | attack | SSH brute-force: detected 15 distinct usernames within a 24-hour window. |
2020-05-14 14:33:25 |
| 168.232.167.58 | attackbots | May 14 08:19:49 buvik sshd[3276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.167.58 May 14 08:19:51 buvik sshd[3276]: Failed password for invalid user lions from 168.232.167.58 port 56646 ssh2 May 14 08:24:25 buvik sshd[3889]: Invalid user 2 from 168.232.167.58 ... |
2020-05-14 14:37:34 |
| 104.27.178.23 | attack | https://andgeraper.xyz/troy_xoiLpOkM4d3tToEM0bSLxKxh4dAq73iL7anM4Qoh0I7MBYB- |
2020-05-14 14:27:00 |
| 31.184.177.6 | attackbots | (sshd) Failed SSH login from 31.184.177.6 (IR/Iran/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 14 05:34:03 amsweb01 sshd[14257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.184.177.6 user=root May 14 05:34:05 amsweb01 sshd[14257]: Failed password for root from 31.184.177.6 port 46514 ssh2 May 14 05:36:22 amsweb01 sshd[14362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.184.177.6 user=root May 14 05:36:23 amsweb01 sshd[14362]: Failed password for root from 31.184.177.6 port 59153 ssh2 May 14 05:52:00 amsweb01 sshd[15506]: Invalid user khalil from 31.184.177.6 port 49913 |
2020-05-14 14:24:56 |
| 196.38.70.24 | attackspam | May 14 02:55:21 vps46666688 sshd[3956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.38.70.24 May 14 02:55:23 vps46666688 sshd[3956]: Failed password for invalid user jj from 196.38.70.24 port 27224 ssh2 ... |
2020-05-14 14:22:46 |