City: unknown
Region: unknown
Country: Australia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.164.38.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30154
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;58.164.38.58. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 17:44:30 CST 2025
;; MSG SIZE rcvd: 105
58.38.164.58.in-addr.arpa domain name pointer cpe-58-164-38-58.nb14.nsw.asp.telstra.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
58.38.164.58.in-addr.arpa name = cpe-58-164-38-58.nb14.nsw.asp.telstra.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.12.4.126 | attack | 𝖦𝖾𝖿𝖾𝗅𝗂𝖼𝗂𝗍𝖾𝖾𝗋𝖽, 𝗃𝖾 𝖻𝖾𝗇𝗍 𝖾𝖾𝗇 𝖿𝗂𝗇𝖺𝗅𝗂𝗌𝗍 𝖺𝗅𝗌 𝗃𝖾 𝖻𝖾𝗏𝖾𝗌𝗍𝗂𝗀𝗍 ! |
2019-09-30 01:32:02 |
| 60.26.202.212 | attackbotsspam | Sep 28 23:01:16 collab sshd[30528]: reveeclipse mapping checking getaddrinfo for no-data [60.26.202.212] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 28 23:01:16 collab sshd[30528]: Invalid user adminixxxr from 60.26.202.212 Sep 28 23:01:16 collab sshd[30528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.26.202.212 Sep 28 23:01:19 collab sshd[30528]: Failed password for invalid user adminixxxr from 60.26.202.212 port 59952 ssh2 Sep 28 23:01:19 collab sshd[30528]: Received disconnect from 60.26.202.212: 11: Bye Bye [preauth] Sep 28 23:17:20 collab sshd[31222]: reveeclipse mapping checking getaddrinfo for no-data [60.26.202.212] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 28 23:17:20 collab sshd[31222]: Invalid user mirror05 from 60.26.202.212 Sep 28 23:17:20 collab sshd[31222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.26.202.212 ........ ----------------------------------------------- https://www.blocklist.de/en/view.htm |
2019-09-30 01:06:04 |
| 5.135.152.97 | attack | $f2bV_matches |
2019-09-30 00:51:23 |
| 104.192.109.140 | attackspam | Sep 29 08:10:03 localhost kernel: [3496822.005490] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=104.192.109.140 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=54759 PROTO=TCP SPT=44617 DPT=7676 SEQ=3966675045 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 29 10:24:08 localhost kernel: [3504867.049597] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=104.192.109.140 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=2403 PROTO=TCP SPT=44617 DPT=106 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 29 10:24:08 localhost kernel: [3504867.049626] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=104.192.109.140 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=2403 PROTO=TCP SPT=44617 DPT=106 SEQ=3535038839 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-09-30 01:30:51 |
| 222.163.15.82 | attackbots | 23/tcp 23/tcp [2019-09-27]2pkt |
2019-09-30 01:07:28 |
| 112.111.162.51 | attack | 8080/tcp [2019-09-29]1pkt |
2019-09-30 01:33:15 |
| 104.144.206.106 | attackbots | WordPress XMLRPC scan :: 104.144.206.106 0.260 BYPASS [29/Sep/2019:22:04:31 1000] www.[censored_1] "POST /xmlrpc.php HTTP/1.1" 200 382 "https://www.[censored_1]/" "PHP/5.3.04" |
2019-09-30 01:18:18 |
| 91.204.188.50 | attackbots | Sep 29 06:43:07 tdfoods sshd\[30780\]: Invalid user jova from 91.204.188.50 Sep 29 06:43:07 tdfoods sshd\[30780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.204.188.50 Sep 29 06:43:09 tdfoods sshd\[30780\]: Failed password for invalid user jova from 91.204.188.50 port 52216 ssh2 Sep 29 06:47:56 tdfoods sshd\[31271\]: Invalid user shaker from 91.204.188.50 Sep 29 06:47:56 tdfoods sshd\[31271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.204.188.50 |
2019-09-30 00:59:58 |
| 102.132.226.213 | attackspam | Automatic report - Port Scan Attack |
2019-09-30 01:25:58 |
| 113.173.224.61 | attack | 400 BAD REQUEST |
2019-09-30 00:40:09 |
| 151.177.228.169 | attackbots | Chat Spam |
2019-09-30 01:32:35 |
| 45.80.65.80 | attackbotsspam | Automatic report - Banned IP Access |
2019-09-30 00:47:47 |
| 148.70.212.162 | attack | Sep 29 05:35:21 auw2 sshd\[4568\]: Invalid user demo from 148.70.212.162 Sep 29 05:35:21 auw2 sshd\[4568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.212.162 Sep 29 05:35:23 auw2 sshd\[4568\]: Failed password for invalid user demo from 148.70.212.162 port 36097 ssh2 Sep 29 05:42:03 auw2 sshd\[5309\]: Invalid user zhun from 148.70.212.162 Sep 29 05:42:03 auw2 sshd\[5309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.212.162 |
2019-09-30 00:39:43 |
| 128.72.207.124 | attackspambots | 445/tcp [2019-09-29]1pkt |
2019-09-30 01:30:27 |
| 160.124.23.24 | attackbots | Threat Management Alert 2: Misc Attack. Signature ET DROP Spamhaus DROP Listed Traffic Inbound group 12. |
2019-09-30 01:07:51 |