City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.82.142.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15839
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;252.82.142.149. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:45:27 CST 2025
;; MSG SIZE rcvd: 107
Host 149.142.82.252.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 149.142.82.252.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
14.231.117.37 | attack | Unauthorized connection attempt from IP address 14.231.117.37 on Port 445(SMB) |
2019-07-09 12:31:24 |
87.98.228.144 | attack | xmlrpc attack |
2019-07-09 12:39:05 |
59.46.142.114 | attack | Unauthorized connection attempt from IP address 59.46.142.114 on Port 445(SMB) |
2019-07-09 13:22:24 |
142.93.39.29 | attackspam | Jul 9 08:19:35 srv-4 sshd\[9247\]: Invalid user otis from 142.93.39.29 Jul 9 08:19:35 srv-4 sshd\[9247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.39.29 Jul 9 08:19:36 srv-4 sshd\[9247\]: Failed password for invalid user otis from 142.93.39.29 port 41512 ssh2 ... |
2019-07-09 13:21:35 |
208.100.26.241 | attackbotsspam | 09.07.2019 04:51:17 Connection to port 3389 blocked by firewall |
2019-07-09 12:55:49 |
130.211.246.128 | attackbotsspam | Jul 9 07:06:57 mail sshd\[14176\]: Invalid user stephanie from 130.211.246.128 Jul 9 07:06:57 mail sshd\[14176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.211.246.128 Jul 9 07:06:58 mail sshd\[14176\]: Failed password for invalid user stephanie from 130.211.246.128 port 36762 ssh2 ... |
2019-07-09 13:19:19 |
93.42.117.137 | attackspam | Jul 9 00:12:35 localhost sshd[31436]: Failed password for root from 93.42.117.137 port 38001 ssh2 Jul 9 00:16:06 localhost sshd[31465]: Failed password for root from 93.42.117.137 port 55687 ssh2 Jul 9 00:18:02 localhost sshd[31475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.42.117.137 ... |
2019-07-09 12:40:02 |
123.24.100.12 | attackspam | Unauthorized connection attempt from IP address 123.24.100.12 on Port 445(SMB) |
2019-07-09 12:48:00 |
1.6.142.202 | attackspambots | Unauthorized connection attempt from IP address 1.6.142.202 on Port 445(SMB) |
2019-07-09 12:39:39 |
196.52.43.119 | attackbots | Port scan: Attack repeated for 24 hours |
2019-07-09 12:43:32 |
2.185.28.250 | attackspam | Unauthorized connection attempt from IP address 2.185.28.250 on Port 445(SMB) |
2019-07-09 12:50:20 |
104.248.150.152 | attackspambots | Tried sshing with brute force. |
2019-07-09 13:17:13 |
27.34.240.250 | attackbotsspam | Unauthorized connection attempt from IP address 27.34.240.250 on Port 445(SMB) |
2019-07-09 12:41:47 |
119.146.222.1 | attackspam | Unauthorized connection attempt from IP address 119.146.222.1 on Port 445(SMB) |
2019-07-09 12:38:00 |
89.252.183.2 | attackspambots | WP_xmlrpc_attack |
2019-07-09 13:04:49 |