City: unknown
Region: unknown
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.168.139.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;57.168.139.20. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 13:23:57 CST 2025
;; MSG SIZE rcvd: 106
Host 20.139.168.57.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 20.139.168.57.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.111.52.57 | attackspam | 103.111.52.57 - - [25/Jul/2019:14:37:30 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 103.111.52.57 - - [25/Jul/2019:14:37:32 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 103.111.52.57 - - [25/Jul/2019:14:37:33 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 103.111.52.57 - - [25/Jul/2019:14:37:34 +0200] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 103.111.52.57 - - [25/Jul/2019:14:37:35 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 103.111.52.57 - - [25/Jul/2019:14:37:36 +0200] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-07-25 23:47:57 |
| 50.87.153.82 | attack | xmlrpc attack |
2019-07-26 01:14:34 |
| 139.59.92.10 | attackbotsspam | Jul 25 18:58:39 ns3367391 sshd\[3328\]: Invalid user oracle from 139.59.92.10 port 50262 Jul 25 18:58:39 ns3367391 sshd\[3328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.92.10 ... |
2019-07-26 01:30:25 |
| 109.251.68.112 | attackbotsspam | Jul 25 12:52:08 vps200512 sshd\[6329\]: Invalid user bala from 109.251.68.112 Jul 25 12:52:08 vps200512 sshd\[6329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.251.68.112 Jul 25 12:52:10 vps200512 sshd\[6329\]: Failed password for invalid user bala from 109.251.68.112 port 50122 ssh2 Jul 25 12:57:42 vps200512 sshd\[6424\]: Invalid user support from 109.251.68.112 Jul 25 12:57:42 vps200512 sshd\[6424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.251.68.112 |
2019-07-26 01:16:26 |
| 3.130.45.196 | attackbotsspam | 3.130.45.196 - - [25/Jul/2019:14:37:07 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 3.130.45.196 - - [25/Jul/2019:14:37:07 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 3.130.45.196 - - [25/Jul/2019:14:37:08 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 3.130.45.196 - - [25/Jul/2019:14:37:09 +0200] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 3.130.45.196 - - [25/Jul/2019:14:37:09 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 3.130.45.196 - - [25/Jul/2019:14:37:10 +0200] "POST /wp-login.php HTTP/1.1" 200 1486 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-07-26 00:08:08 |
| 159.203.13.166 | attack | Automatic report - Banned IP Access |
2019-07-25 23:59:34 |
| 37.189.70.118 | attackspambots | Invalid user steam from 37.189.70.118 port 39836 |
2019-07-26 01:08:21 |
| 220.128.241.33 | attack | Jul 25 16:36:22 marvibiene sshd[16325]: Invalid user rajan from 220.128.241.33 port 31164 Jul 25 16:36:22 marvibiene sshd[16325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.128.241.33 Jul 25 16:36:22 marvibiene sshd[16325]: Invalid user rajan from 220.128.241.33 port 31164 Jul 25 16:36:24 marvibiene sshd[16325]: Failed password for invalid user rajan from 220.128.241.33 port 31164 ssh2 ... |
2019-07-26 01:03:09 |
| 139.59.28.61 | attackbotsspam | Jul 25 12:14:39 plusreed sshd[17906]: Invalid user upload from 139.59.28.61 ... |
2019-07-26 00:33:11 |
| 115.226.139.50 | attackbotsspam | Forbidden directory scan :: 2019/07/25 22:36:53 [error] 1106#1106: *879657 access forbidden by rule, client: 115.226.139.50, server: [censored_1], request: "GET /.../exchange-2010-disconnected-mailbox-not-appearing HTTP/1.1", host: "www.[censored_1]" |
2019-07-26 00:14:30 |
| 58.47.177.158 | attack | Jul 25 18:40:48 ArkNodeAT sshd\[19017\]: Invalid user disco from 58.47.177.158 Jul 25 18:40:48 ArkNodeAT sshd\[19017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.47.177.158 Jul 25 18:40:50 ArkNodeAT sshd\[19017\]: Failed password for invalid user disco from 58.47.177.158 port 56760 ssh2 |
2019-07-26 00:56:11 |
| 37.187.113.229 | attackbots | Jul 25 17:52:38 minden010 sshd[28406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.113.229 Jul 25 17:52:40 minden010 sshd[28406]: Failed password for invalid user peter from 37.187.113.229 port 34118 ssh2 Jul 25 17:57:52 minden010 sshd[30450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.113.229 ... |
2019-07-26 00:07:38 |
| 142.93.201.168 | attackbotsspam | Jul 25 18:49:20 server sshd\[5868\]: Invalid user kuaisuweb from 142.93.201.168 port 41516 Jul 25 18:49:20 server sshd\[5868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.201.168 Jul 25 18:49:23 server sshd\[5868\]: Failed password for invalid user kuaisuweb from 142.93.201.168 port 41516 ssh2 Jul 25 18:53:44 server sshd\[5804\]: User root from 142.93.201.168 not allowed because listed in DenyUsers Jul 25 18:53:44 server sshd\[5804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.201.168 user=root |
2019-07-26 00:15:41 |
| 192.80.136.150 | attackspam | Automatic report - Port Scan Attack |
2019-07-26 01:24:47 |
| 195.140.215.131 | attack | Jul 25 14:29:42 mail sshd\[23626\]: Invalid user pan from 195.140.215.131 port 34728 Jul 25 14:29:42 mail sshd\[23626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.140.215.131 Jul 25 14:29:45 mail sshd\[23626\]: Failed password for invalid user pan from 195.140.215.131 port 34728 ssh2 Jul 25 14:35:06 mail sshd\[24568\]: Invalid user francesco from 195.140.215.131 port 32864 Jul 25 14:35:06 mail sshd\[24568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.140.215.131 |
2019-07-26 01:19:37 |