City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 65.39.39.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7052
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;65.39.39.220. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 23:42:48 CST 2025
;; MSG SIZE rcvd: 105
220.39.39.65.in-addr.arpa domain name pointer lucampus-65-39-39-220.lakeheadu.ca.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
220.39.39.65.in-addr.arpa name = lucampus-65-39-39-220.lakeheadu.ca.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 97.87.244.154 | attackbotsspam | 2020-01-25T13:14:18.498243abusebot-8.cloudsearch.cf sshd[17776]: Invalid user jaime from 97.87.244.154 port 43206 2020-01-25T13:14:18.504955abusebot-8.cloudsearch.cf sshd[17776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97-87-244-154.static.sgnw.mi.charter.com 2020-01-25T13:14:18.498243abusebot-8.cloudsearch.cf sshd[17776]: Invalid user jaime from 97.87.244.154 port 43206 2020-01-25T13:14:20.261576abusebot-8.cloudsearch.cf sshd[17776]: Failed password for invalid user jaime from 97.87.244.154 port 43206 ssh2 2020-01-25T13:19:26.991381abusebot-8.cloudsearch.cf sshd[18445]: Invalid user admin from 97.87.244.154 port 56397 2020-01-25T13:19:27.004109abusebot-8.cloudsearch.cf sshd[18445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97-87-244-154.static.sgnw.mi.charter.com 2020-01-25T13:19:26.991381abusebot-8.cloudsearch.cf sshd[18445]: Invalid user admin from 97.87.244.154 port 56397 2020-01-25T13:19: ... |
2020-01-25 23:36:29 |
| 186.42.104.98 | attack | Lines containing failures of 186.42.104.98 Jan 25 14:24:14 shared01 sshd[15517]: Invalid user user from 186.42.104.98 port 9153 Jan 25 14:24:14 shared01 sshd[15517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.42.104.98 Jan 25 14:24:16 shared01 sshd[15517]: Failed password for invalid user user from 186.42.104.98 port 9153 ssh2 Jan 25 14:24:17 shared01 sshd[15517]: Connection closed by invalid user user 186.42.104.98 port 9153 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=186.42.104.98 |
2020-01-25 23:36:02 |
| 203.222.17.59 | attackbots | Honeypot attack, port: 5555, PTR: 203-222-17-59.veetime.com. |
2020-01-25 23:50:20 |
| 189.254.67.232 | attackspam | Honeypot attack, port: 445, PTR: customer-189-254-67-232-sta.uninet-ide.com.mx. |
2020-01-25 23:25:31 |
| 78.128.113.88 | attack | Jan 25 15:51:32 xeon postfix/smtpd[53265]: warning: unknown[78.128.113.88]: SASL PLAIN authentication failed: authentication failure |
2020-01-25 23:47:57 |
| 46.38.144.57 | attack | Jan 25 16:14:35 vmanager6029 postfix/smtpd\[29731\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 25 16:15:21 vmanager6029 postfix/smtpd\[29731\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-01-25 23:16:28 |
| 2.144.247.229 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-25 23:53:37 |
| 190.95.86.145 | attack | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-01-25 23:18:32 |
| 190.52.178.221 | attackbots | Automatic report - Port Scan Attack |
2020-01-25 23:40:57 |
| 138.186.63.73 | attackbotsspam | Jan 25 15:39:35 hcbbdb sshd\[23462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.otrimport.com.py user=root Jan 25 15:39:37 hcbbdb sshd\[23462\]: Failed password for root from 138.186.63.73 port 58210 ssh2 Jan 25 15:43:58 hcbbdb sshd\[24045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.otrimport.com.py user=root Jan 25 15:44:00 hcbbdb sshd\[24045\]: Failed password for root from 138.186.63.73 port 52180 ssh2 Jan 25 15:48:20 hcbbdb sshd\[24554\]: Invalid user oracle from 138.186.63.73 Jan 25 15:48:20 hcbbdb sshd\[24554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.otrimport.com.py |
2020-01-25 23:52:47 |
| 93.118.183.16 | attackspam | Honeypot attack, port: 81, PTR: PTR record not found |
2020-01-25 23:10:34 |
| 132.148.129.180 | attackbotsspam | Jan 25 20:14:00 webhost01 sshd[28284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.148.129.180 Jan 25 20:14:02 webhost01 sshd[28284]: Failed password for invalid user ethos from 132.148.129.180 port 56982 ssh2 ... |
2020-01-25 23:35:41 |
| 93.123.115.30 | attackspam | Honeypot attack, port: 445, PTR: dhcp-30.net1.bg. |
2020-01-25 23:51:48 |
| 187.227.124.165 | attackbotsspam | Honeypot attack, port: 81, PTR: dsl-187-227-124-165-dyn.prod-infinitum.com.mx. |
2020-01-25 23:26:04 |
| 183.82.10.139 | attack | Honeypot attack, port: 445, PTR: broadband.actcorp.in. |
2020-01-25 23:47:06 |