City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.162.185.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14003
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;39.162.185.134. IN A
;; AUTHORITY SECTION:
. 59 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 19:16:17 CST 2022
;; MSG SIZE rcvd: 107
Host 134.185.162.39.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 134.185.162.39.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
93.174.95.106 | attack | Automatic report - Banned IP Access |
2020-04-12 06:42:38 |
192.144.225.182 | attackbotsspam | SSH Invalid Login |
2020-04-12 06:23:36 |
5.89.10.81 | attack | Apr 11 22:40:42: Invalid user postgres from 5.89.10.81 port 53354 |
2020-04-12 06:19:03 |
118.24.210.254 | attackbotsspam | Apr 11 22:55:23 h2829583 sshd[6345]: Failed password for root from 118.24.210.254 port 43304 ssh2 |
2020-04-12 06:40:43 |
61.140.238.169 | attackspam | Apr 11 22:52:54 host01 sshd[20893]: Failed password for root from 61.140.238.169 port 48838 ssh2 Apr 11 22:55:24 host01 sshd[21342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.140.238.169 Apr 11 22:55:26 host01 sshd[21342]: Failed password for invalid user admin from 61.140.238.169 port 58242 ssh2 ... |
2020-04-12 06:39:02 |
222.186.30.57 | attack | 11.04.2020 22:10:48 SSH access blocked by firewall |
2020-04-12 06:11:05 |
121.36.125.167 | attackspam | Apr 11 22:52:21 OPSO sshd\[5780\]: Invalid user test from 121.36.125.167 port 59910 Apr 11 22:52:21 OPSO sshd\[5780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.36.125.167 Apr 11 22:52:23 OPSO sshd\[5780\]: Failed password for invalid user test from 121.36.125.167 port 59910 ssh2 Apr 11 22:55:59 OPSO sshd\[7073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.36.125.167 user=root Apr 11 22:56:01 OPSO sshd\[7073\]: Failed password for root from 121.36.125.167 port 59062 ssh2 |
2020-04-12 06:17:15 |
200.89.178.12 | attackspambots | Invalid user haygood from 200.89.178.12 port 42914 |
2020-04-12 06:36:20 |
85.206.162.107 | attack | [ 📨 ] From return-aluguel=marcoslimaimoveis.com.br@pureza.we.bs Sat Apr 11 17:55:37 2020 Received: from mailsg-mx-12.pureza.we.bs ([85.206.162.107]:47708) |
2020-04-12 06:25:05 |
218.92.0.145 | attackspambots | Apr 11 13:16:29 debian sshd[9314]: Unable to negotiate with 218.92.0.145 port 37313: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Apr 11 18:33:40 debian sshd[23668]: Unable to negotiate with 218.92.0.145 port 17955: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... |
2020-04-12 06:35:53 |
47.5.200.48 | attackbotsspam | Apr 12 00:16:24 eventyay sshd[7179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.5.200.48 Apr 12 00:16:27 eventyay sshd[7179]: Failed password for invalid user sumi from 47.5.200.48 port 60178 ssh2 Apr 12 00:23:41 eventyay sshd[7560]: Failed password for root from 47.5.200.48 port 40720 ssh2 ... |
2020-04-12 06:27:15 |
80.211.128.156 | attack | Invalid user user from 80.211.128.156 port 54336 |
2020-04-12 06:46:25 |
113.31.118.120 | attackbotsspam | Apr 11 23:13:25 server sshd[19356]: Failed password for root from 113.31.118.120 port 47298 ssh2 Apr 11 23:18:45 server sshd[20279]: Failed password for root from 113.31.118.120 port 50254 ssh2 Apr 11 23:22:30 server sshd[20961]: Failed password for root from 113.31.118.120 port 41868 ssh2 |
2020-04-12 06:16:14 |
157.230.48.124 | attackspambots | (sshd) Failed SSH login from 157.230.48.124 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 11 23:29:31 ubnt-55d23 sshd[26840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.48.124 user=root Apr 11 23:29:33 ubnt-55d23 sshd[26840]: Failed password for root from 157.230.48.124 port 58464 ssh2 |
2020-04-12 06:23:54 |
110.49.70.248 | attackspam | Apr 11 23:31:47 nextcloud sshd\[27346\]: Invalid user rootroot4321 from 110.49.70.248 Apr 11 23:31:47 nextcloud sshd\[27346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.70.248 Apr 11 23:31:49 nextcloud sshd\[27346\]: Failed password for invalid user rootroot4321 from 110.49.70.248 port 36352 ssh2 |
2020-04-12 06:22:30 |