City: unknown
Region: unknown
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.197.134.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10954
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;39.197.134.30. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400
;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 09:24:17 CST 2025
;; MSG SIZE rcvd: 106
Host 30.134.197.39.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 30.134.197.39.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 114.57.190.131 | attack | $f2bV_matches |
2019-08-20 03:07:06 |
| 202.150.133.82 | attack | Unauthorized connection attempt from IP address 202.150.133.82 on Port 445(SMB) |
2019-08-20 02:52:38 |
| 124.107.246.250 | attackbotsspam | Aug 19 18:54:10 hb sshd\[28744\]: Invalid user Abcd1234 from 124.107.246.250 Aug 19 18:54:10 hb sshd\[28744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.107.246.250 Aug 19 18:54:13 hb sshd\[28744\]: Failed password for invalid user Abcd1234 from 124.107.246.250 port 13162 ssh2 Aug 19 18:59:07 hb sshd\[29174\]: Invalid user fns from 124.107.246.250 Aug 19 18:59:07 hb sshd\[29174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.107.246.250 |
2019-08-20 03:11:46 |
| 121.67.246.139 | attackspam | Aug 19 18:54:16 hb sshd\[28757\]: Invalid user lenin from 121.67.246.139 Aug 19 18:54:16 hb sshd\[28757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.67.246.139 Aug 19 18:54:18 hb sshd\[28757\]: Failed password for invalid user lenin from 121.67.246.139 port 36438 ssh2 Aug 19 18:59:12 hb sshd\[29192\]: Invalid user service from 121.67.246.139 Aug 19 18:59:12 hb sshd\[29192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.67.246.139 |
2019-08-20 03:09:32 |
| 79.137.72.121 | attackspam | Invalid user content from 79.137.72.121 port 41260 |
2019-08-20 02:54:01 |
| 81.106.220.20 | attack | Aug 19 14:14:35 ny01 sshd[12257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.106.220.20 Aug 19 14:14:38 ny01 sshd[12257]: Failed password for invalid user pm from 81.106.220.20 port 59452 ssh2 Aug 19 14:18:19 ny01 sshd[12653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.106.220.20 |
2019-08-20 02:47:52 |
| 128.199.128.215 | attackbots | Invalid user linda from 128.199.128.215 port 54018 |
2019-08-20 02:44:17 |
| 89.248.174.219 | attack | Unauthorised access (Aug 19) SRC=89.248.174.219 LEN=40 TTL=249 ID=54321 TCP DPT=23 WINDOW=65535 SYN |
2019-08-20 03:30:09 |
| 142.234.39.38 | attackspam | 08/19/2019-15:07:16.255316 142.234.39.38 Protocol: 6 ET SCAN Potential SSH Scan |
2019-08-20 03:08:18 |
| 102.65.158.186 | attackspam | 2019-08-19T19:08:24.917972abusebot-4.cloudsearch.cf sshd\[18544\]: Invalid user test from 102.65.158.186 port 51966 |
2019-08-20 03:12:33 |
| 2.228.40.235 | attackbotsspam | Aug 19 08:55:11 aiointranet sshd\[17128\]: Invalid user scott from 2.228.40.235 Aug 19 08:55:11 aiointranet sshd\[17128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2-228-40-235.ip189.fastwebnet.it Aug 19 08:55:12 aiointranet sshd\[17128\]: Failed password for invalid user scott from 2.228.40.235 port 19621 ssh2 Aug 19 08:59:08 aiointranet sshd\[17489\]: Invalid user standard from 2.228.40.235 Aug 19 08:59:08 aiointranet sshd\[17489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2-228-40-235.ip189.fastwebnet.it |
2019-08-20 03:11:27 |
| 185.247.117.47 | attackbotsspam | Aug 19 20:54:51 SilenceServices sshd[17685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.247.117.47 Aug 19 20:54:52 SilenceServices sshd[17685]: Failed password for invalid user fabian from 185.247.117.47 port 46386 ssh2 Aug 19 20:59:07 SilenceServices sshd[20311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.247.117.47 |
2019-08-20 03:13:42 |
| 68.183.55.240 | attackspam | LinkSys E-series Routers Remote Code Execution Vulnerability, PTR: PTR record not found |
2019-08-20 02:52:04 |
| 51.77.220.6 | attackspambots | Aug 19 14:55:22 xtremcommunity sshd\[20059\]: Invalid user guest from 51.77.220.6 port 42582 Aug 19 14:55:22 xtremcommunity sshd\[20059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.220.6 Aug 19 14:55:24 xtremcommunity sshd\[20059\]: Failed password for invalid user guest from 51.77.220.6 port 42582 ssh2 Aug 19 14:59:17 xtremcommunity sshd\[20167\]: Invalid user srudent from 51.77.220.6 port 60588 Aug 19 14:59:17 xtremcommunity sshd\[20167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.220.6 ... |
2019-08-20 03:04:51 |
| 167.99.131.243 | attackspam | SSH Brute-Forcing (ownc) |
2019-08-20 03:21:35 |