City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.13.149.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48453
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;40.13.149.2. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062700 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 27 20:37:15 CST 2025
;; MSG SIZE rcvd: 104
Host 2.149.13.40.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 2.149.13.40.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
165.231.98.201 | attackspambots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/165.231.98.201/ SE - 1H : (5) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : SE NAME ASN : ASN37518 IP : 165.231.98.201 CIDR : 165.231.98.0/24 PREFIX COUNT : 226 UNIQUE IP COUNT : 1003520 ATTACKS DETECTED ASN37518 : 1H - 2 3H - 2 6H - 2 12H - 2 24H - 2 DateTime : 2020-03-18 14:10:42 INFO : Looking for resource vulnerabilities 403 Detected and Blocked by ADMIN - data recovery |
2020-03-18 22:58:57 |
139.59.90.0 | attackspambots | Mar 18 09:59:23 mail sshd\[36576\]: Invalid user postgres from 139.59.90.0 Mar 18 09:59:23 mail sshd\[36576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.90.0 ... |
2020-03-18 22:45:05 |
125.212.159.86 | attackbotsspam | Honeypot attack, port: 445, PTR: dynamic-adsl.viettel.vn. |
2020-03-18 22:55:22 |
185.147.162.21 | attackbots | Mar 18 13:10:47 work-partkepr sshd\[4988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.147.162.21 user=root Mar 18 13:10:48 work-partkepr sshd\[4988\]: Failed password for root from 185.147.162.21 port 51650 ssh2 ... |
2020-03-18 22:57:05 |
95.64.27.231 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:48. |
2020-03-18 22:51:09 |
167.172.175.9 | attackspam | Mar 18 15:17:01 OPSO sshd\[8811\]: Invalid user git from 167.172.175.9 port 35516 Mar 18 15:17:01 OPSO sshd\[8811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.175.9 Mar 18 15:17:02 OPSO sshd\[8811\]: Failed password for invalid user git from 167.172.175.9 port 35516 ssh2 Mar 18 15:21:21 OPSO sshd\[9751\]: Invalid user mdpi from 167.172.175.9 port 57284 Mar 18 15:21:21 OPSO sshd\[9751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.175.9 |
2020-03-18 22:40:05 |
177.34.125.113 | attackspambots | Mar 18 14:11:12 nextcloud sshd\[4591\]: Invalid user glassfish3 from 177.34.125.113 Mar 18 14:11:12 nextcloud sshd\[4591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.34.125.113 Mar 18 14:11:14 nextcloud sshd\[4591\]: Failed password for invalid user glassfish3 from 177.34.125.113 port 38248 ssh2 |
2020-03-18 22:15:41 |
94.49.60.67 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:48. |
2020-03-18 22:52:22 |
222.186.180.9 | attack | 2020-03-18T14:15:53.291168shield sshd\[10805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9 user=root 2020-03-18T14:15:55.376018shield sshd\[10805\]: Failed password for root from 222.186.180.9 port 28520 ssh2 2020-03-18T14:15:58.130907shield sshd\[10805\]: Failed password for root from 222.186.180.9 port 28520 ssh2 2020-03-18T14:16:01.815862shield sshd\[10805\]: Failed password for root from 222.186.180.9 port 28520 ssh2 2020-03-18T14:16:04.532128shield sshd\[10805\]: Failed password for root from 222.186.180.9 port 28520 ssh2 |
2020-03-18 22:18:37 |
222.186.30.57 | attack | Mar 18 15:16:09 vmd17057 sshd[14168]: Failed password for root from 222.186.30.57 port 30406 ssh2 Mar 18 15:16:12 vmd17057 sshd[14168]: Failed password for root from 222.186.30.57 port 30406 ssh2 ... |
2020-03-18 22:19:40 |
106.13.105.231 | attack | Mar 18 14:08:34 ns381471 sshd[528]: Failed password for root from 106.13.105.231 port 59692 ssh2 |
2020-03-18 22:11:17 |
82.213.38.147 | attackspam | Mar 18 10:08:21 firewall sshd[23509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.213.38.147 user=root Mar 18 10:08:23 firewall sshd[23509]: Failed password for root from 82.213.38.147 port 61225 ssh2 Mar 18 10:11:01 firewall sshd[23698]: Invalid user fossil from 82.213.38.147 ... |
2020-03-18 22:31:36 |
106.13.160.127 | attack | Mar 18 09:28:37 plusreed sshd[17997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.160.127 user=root Mar 18 09:28:39 plusreed sshd[17997]: Failed password for root from 106.13.160.127 port 55566 ssh2 ... |
2020-03-18 22:47:21 |
87.117.54.161 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:47. |
2020-03-18 22:53:55 |
162.243.58.222 | attackbotsspam | Brute force attempt |
2020-03-18 22:20:35 |