City: unknown
Region: unknown
Country: Ireland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.142.130.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29994
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;57.142.130.40. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:26:54 CST 2025
;; MSG SIZE rcvd: 106
Host 40.130.142.57.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 40.130.142.57.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 220.247.172.138 | attack | 20/5/31@08:08:39: FAIL: Alarm-Network address from=220.247.172.138 20/5/31@08:08:39: FAIL: Alarm-Network address from=220.247.172.138 ... |
2020-06-01 01:54:20 |
| 87.251.74.140 | attack | May 31 19:26:18 debian-2gb-nbg1-2 kernel: \[13204754.087413\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.140 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=59368 PROTO=TCP SPT=44773 DPT=7238 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-01 01:38:44 |
| 110.154.190.71 | attackspam | Telnetd brute force attack detected by fail2ban |
2020-06-01 01:58:32 |
| 150.136.220.58 | attack | May 31 18:34:08 ajax sshd[12259]: Failed password for root from 150.136.220.58 port 60302 ssh2 |
2020-06-01 01:45:51 |
| 124.248.48.105 | attackspam | May 28 06:23:01 www sshd[1910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.248.48.105 user=r.r May 28 06:23:03 www sshd[1910]: Failed password for r.r from 124.248.48.105 port 46590 ssh2 May 28 06:49:27 www sshd[8283]: Invalid user david from 124.248.48.105 May 28 06:49:27 www sshd[8283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.248.48.105 May 28 06:49:29 www sshd[8283]: Failed password for invalid user david from 124.248.48.105 port 43030 ssh2 May 28 06:52:24 www sshd[9077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.248.48.105 user=r.r May 28 06:52:26 www sshd[9077]: Failed password for r.r from 124.248.48.105 port 60276 ssh2 May 28 06:55:28 www sshd[9797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.248.48.105 user=nobody May 28 06:55:30 www sshd[9797]: Failed password ........ ------------------------------- |
2020-06-01 01:43:14 |
| 103.85.9.85 | attack | 1590926924 - 05/31/2020 14:08:44 Host: 103.85.9.85/103.85.9.85 Port: 445 TCP Blocked |
2020-06-01 01:51:48 |
| 209.105.243.145 | attack | 2020-05-31T12:09:17.874712homeassistant sshd[31706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.105.243.145 user=root 2020-05-31T12:09:20.086699homeassistant sshd[31706]: Failed password for root from 209.105.243.145 port 58074 ssh2 ... |
2020-06-01 01:30:00 |
| 103.93.16.105 | attack | 2020-05-31T14:03:35.203624struts4.enskede.local sshd\[23941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.16.105 user=root 2020-05-31T14:03:38.594580struts4.enskede.local sshd\[23941\]: Failed password for root from 103.93.16.105 port 52588 ssh2 2020-05-31T14:07:12.385299struts4.enskede.local sshd\[23950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.16.105 user=root 2020-05-31T14:07:14.963105struts4.enskede.local sshd\[23950\]: Failed password for root from 103.93.16.105 port 55730 ssh2 2020-05-31T14:08:30.613514struts4.enskede.local sshd\[23953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.93.16.105 user=root ... |
2020-06-01 02:00:28 |
| 188.254.0.197 | attack | May 31 13:56:19 ns382633 sshd\[14896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.197 user=root May 31 13:56:21 ns382633 sshd\[14896\]: Failed password for root from 188.254.0.197 port 38157 ssh2 May 31 14:06:08 ns382633 sshd\[16941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.197 user=root May 31 14:06:10 ns382633 sshd\[16941\]: Failed password for root from 188.254.0.197 port 41602 ssh2 May 31 14:09:02 ns382633 sshd\[17179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.197 user=root |
2020-06-01 01:39:29 |
| 14.186.147.224 | attack | (smtpauth) Failed SMTP AUTH login from 14.186.147.224 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-31 16:38:31 login authenticator failed for ([127.0.0.1]) [14.186.147.224]: 535 Incorrect authentication data (set_id=info) |
2020-06-01 01:59:04 |
| 184.22.216.28 | attack | 1590926914 - 05/31/2020 14:08:34 Host: 184.22.216.28/184.22.216.28 Port: 445 TCP Blocked |
2020-06-01 01:58:00 |
| 170.247.41.74 | attackspam | (smtpauth) Failed SMTP AUTH login from 170.247.41.74 (BR/Brazil/170-247-41-74.westlink.net.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-31 16:38:14 login authenticator failed for 170-247-41-74.westlink.net.br ([127.0.0.1]) [170.247.41.74]: 535 Incorrect authentication data (set_id=info@breadnarin.com) |
2020-06-01 02:04:31 |
| 222.186.175.182 | attackbots | 2020-05-31T17:55:48.182583abusebot-2.cloudsearch.cf sshd[15240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182 user=root 2020-05-31T17:55:50.634715abusebot-2.cloudsearch.cf sshd[15240]: Failed password for root from 222.186.175.182 port 25974 ssh2 2020-05-31T17:55:54.168519abusebot-2.cloudsearch.cf sshd[15240]: Failed password for root from 222.186.175.182 port 25974 ssh2 2020-05-31T17:55:48.182583abusebot-2.cloudsearch.cf sshd[15240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182 user=root 2020-05-31T17:55:50.634715abusebot-2.cloudsearch.cf sshd[15240]: Failed password for root from 222.186.175.182 port 25974 ssh2 2020-05-31T17:55:54.168519abusebot-2.cloudsearch.cf sshd[15240]: Failed password for root from 222.186.175.182 port 25974 ssh2 2020-05-31T17:55:48.182583abusebot-2.cloudsearch.cf sshd[15240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ... |
2020-06-01 01:59:21 |
| 2600:387:3:803::58 | spambotsattackproxy | I have been hacked |
2020-06-01 02:02:18 |
| 182.43.136.178 | attackspam | $f2bV_matches |
2020-06-01 02:04:49 |