City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.140.129.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34998
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;30.140.129.29. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 19:50:53 CST 2025
;; MSG SIZE rcvd: 106
Host 29.129.140.30.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 29.129.140.30.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
80.211.154.207 | attack | Oct 30 03:23:14 cumulus sshd[1658]: Invalid user richards from 80.211.154.207 port 36218 Oct 30 03:23:14 cumulus sshd[1658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.154.207 Oct 30 03:23:16 cumulus sshd[1658]: Failed password for invalid user richards from 80.211.154.207 port 36218 ssh2 Oct 30 03:23:16 cumulus sshd[1658]: Received disconnect from 80.211.154.207 port 36218:11: Bye Bye [preauth] Oct 30 03:23:16 cumulus sshd[1658]: Disconnected from 80.211.154.207 port 36218 [preauth] Oct 30 03:49:27 cumulus sshd[3076]: Invalid user sysdba from 80.211.154.207 port 43284 Oct 30 03:49:27 cumulus sshd[3076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.154.207 Oct 30 03:49:28 cumulus sshd[3076]: Failed password for invalid user sysdba from 80.211.154.207 port 43284 ssh2 Oct 30 03:49:29 cumulus sshd[3076]: Received disconnect from 80.211.154.207 port 43284:11: Bye Bye [preau........ ------------------------------- |
2019-10-30 17:23:52 |
178.90.222.50 | attackspambots | Unauthorised access (Oct 30) SRC=178.90.222.50 LEN=52 TTL=117 ID=10860 DF TCP DPT=445 WINDOW=8192 SYN |
2019-10-30 17:32:54 |
88.99.2.180 | attackspam | Attack xmlrpc.php , wp-login.php |
2019-10-30 17:28:56 |
106.13.86.12 | attack | Oct 30 05:51:31 MK-Soft-VM4 sshd[20061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.86.12 Oct 30 05:51:33 MK-Soft-VM4 sshd[20061]: Failed password for invalid user ming from 106.13.86.12 port 56336 ssh2 ... |
2019-10-30 17:23:27 |
177.107.134.82 | attack | Sending SPAM email |
2019-10-30 17:06:59 |
89.248.160.193 | attackspambots | Port Scan: TCP/8522 |
2019-10-30 17:16:18 |
31.163.190.101 | attack | 2323/tcp [2019-10-30]1pkt |
2019-10-30 16:59:56 |
202.131.249.118 | attackbotsspam | 23/tcp [2019-10-30]1pkt |
2019-10-30 17:27:21 |
194.58.33.124 | attack | [portscan] Port scan |
2019-10-30 17:29:28 |
154.8.164.214 | attackspam | Oct 30 07:57:23 sso sshd[3469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.164.214 Oct 30 07:57:26 sso sshd[3469]: Failed password for invalid user 2014 from 154.8.164.214 port 58473 ssh2 ... |
2019-10-30 17:31:44 |
132.232.7.197 | attackspam | Oct 30 05:36:56 legacy sshd[21808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.7.197 Oct 30 05:36:58 legacy sshd[21808]: Failed password for invalid user rfrfrfrf from 132.232.7.197 port 42250 ssh2 Oct 30 05:42:18 legacy sshd[21975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.7.197 ... |
2019-10-30 17:39:49 |
118.122.6.227 | attackbotsspam | 1433/tcp [2019-10-30]1pkt |
2019-10-30 17:38:59 |
130.89.221.51 | attackspambots | Oct 29 17:48:47 roadrisk sshd[12311]: Failed password for r.r from 130.89.221.51 port 40586 ssh2 Oct 29 17:48:47 roadrisk sshd[12311]: Received disconnect from 130.89.221.51: 11: Bye Bye [preauth] Oct 29 17:53:32 roadrisk sshd[12392]: Failed password for invalid user zhanghua from 130.89.221.51 port 58170 ssh2 Oct 29 17:53:32 roadrisk sshd[12392]: Received disconnect from 130.89.221.51: 11: Bye Bye [preauth] Oct 29 17:57:26 roadrisk sshd[12454]: Failed password for invalid user user from 130.89.221.51 port 42432 ssh2 Oct 29 17:57:26 roadrisk sshd[12454]: Received disconnect from 130.89.221.51: 11: Bye Bye [preauth] Oct 29 18:01:21 roadrisk sshd[12546]: Failed password for r.r from 130.89.221.51 port 54892 ssh2 Oct 29 18:01:21 roadrisk sshd[12546]: Received disconnect from 130.89.221.51: 11: Bye Bye [preauth] Oct 29 18:05:12 roadrisk sshd[12632]: Failed password for r.r from 130.89.221.51 port 39120 ssh2 Oct 29 18:05:12 roadrisk sshd[12632]: Received disconnect from 130......... ------------------------------- |
2019-10-30 17:18:39 |
124.248.252.91 | attack | firewall-block, port(s): 445/tcp |
2019-10-30 17:00:10 |
41.225.232.143 | attackbotsspam | 3389BruteforceFW23 |
2019-10-30 17:14:16 |