City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.199.14.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55332
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.199.14.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:52:45 CST 2025
;; MSG SIZE rcvd: 106
Host 139.14.199.45.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.14.199.45.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
193.239.44.195 | attackbotsspam | Automatic report - XMLRPC Attack |
2020-01-11 17:46:36 |
89.221.213.4 | attackbotsspam | Automatic report - XMLRPC Attack |
2020-01-11 17:35:50 |
79.7.241.94 | attack | 2019-12-12 10:50:42,593 fail2ban.actions [802]: NOTICE [sshd] Ban 79.7.241.94 2019-12-12 13:59:51,509 fail2ban.actions [802]: NOTICE [sshd] Ban 79.7.241.94 2019-12-12 17:12:13,909 fail2ban.actions [802]: NOTICE [sshd] Ban 79.7.241.94 ... |
2020-01-11 17:44:27 |
92.169.247.72 | attackbotsspam | SSH brutforce |
2020-01-11 17:34:48 |
132.232.74.106 | attack | Jan 11 06:03:07 vtv3 sshd[26281]: Failed password for root from 132.232.74.106 port 49736 ssh2 Jan 11 06:06:23 vtv3 sshd[27967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.74.106 Jan 11 06:06:25 vtv3 sshd[27967]: Failed password for invalid user user7 from 132.232.74.106 port 47792 ssh2 Jan 11 06:19:30 vtv3 sshd[1609]: Failed password for root from 132.232.74.106 port 40038 ssh2 Jan 11 06:22:50 vtv3 sshd[3240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.74.106 Jan 11 06:22:52 vtv3 sshd[3240]: Failed password for invalid user admin from 132.232.74.106 port 38104 ssh2 Jan 11 06:35:43 vtv3 sshd[9618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.74.106 Jan 11 06:35:45 vtv3 sshd[9618]: Failed password for invalid user laurentiu from 132.232.74.106 port 58584 ssh2 Jan 11 06:38:59 vtv3 sshd[10798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 |
2020-01-11 17:58:07 |
188.65.92.29 | attackspambots | Invalid user wifi from 188.65.92.29 port 59248 |
2020-01-11 17:39:54 |
96.82.110.170 | attackspambots | Jan 11 09:51:44 localhost sshd\[2560\]: Invalid user pi from 96.82.110.170 port 55630 Jan 11 09:51:45 localhost sshd\[2560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.82.110.170 Jan 11 09:51:45 localhost sshd\[2563\]: Invalid user pi from 96.82.110.170 port 55638 |
2020-01-11 17:51:37 |
218.92.0.178 | attackspambots | Jan 11 11:04:04 MK-Soft-VM8 sshd[795]: Failed password for root from 218.92.0.178 port 12070 ssh2 Jan 11 11:04:09 MK-Soft-VM8 sshd[795]: Failed password for root from 218.92.0.178 port 12070 ssh2 ... |
2020-01-11 18:07:38 |
195.208.144.82 | attackbotsspam | 1433/tcp 1433/tcp 1433/tcp [2020-01-11]3pkt |
2020-01-11 17:59:01 |
146.88.240.39 | attackbots | Unauthorized connection attempt detected from IP address 146.88.240.39 to port 443 |
2020-01-11 18:01:01 |
49.234.10.207 | attackspambots | Jan 11 10:27:24 ncomp sshd[11022]: Invalid user mue from 49.234.10.207 Jan 11 10:27:24 ncomp sshd[11022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.10.207 Jan 11 10:27:24 ncomp sshd[11022]: Invalid user mue from 49.234.10.207 Jan 11 10:27:26 ncomp sshd[11022]: Failed password for invalid user mue from 49.234.10.207 port 52916 ssh2 |
2020-01-11 17:36:51 |
218.92.0.164 | attack | Jan 11 04:24:21 mail sshd\[32006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.164 user=root ... |
2020-01-11 17:46:20 |
114.239.46.197 | attackbotsspam | unauthorized connection attempt |
2020-01-11 18:15:08 |
193.169.253.86 | attackspam | Unauthorized connection attempt detected from IP address 193.169.253.86 to port 8545 |
2020-01-11 18:00:16 |
52.89.162.95 | attackbots | 01/11/2020-10:19:46.524394 52.89.162.95 Protocol: 6 SURICATA TLS invalid record/traffic |
2020-01-11 17:36:29 |