City: unknown
Region: unknown
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.139.121.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34407
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.139.121.145. IN A
;; AUTHORITY SECTION:
. 163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022013001 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 31 11:50:18 CST 2022
;; MSG SIZE rcvd: 107
Host 145.121.139.66.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 145.121.139.66.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
103.145.12.100 | attackspambots | Automatic report - Banned IP Access |
2020-05-16 12:10:52 |
184.22.83.136 | attack | tried to hack email |
2020-05-16 10:44:17 |
195.231.3.146 | attackbots | May 16 03:28:18 mail.srvfarm.net postfix/smtpd[2325383]: warning: unknown[195.231.3.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 16 03:28:18 mail.srvfarm.net postfix/smtpd[2325383]: lost connection after AUTH from unknown[195.231.3.146] May 16 03:30:38 mail.srvfarm.net postfix/smtpd[2325372]: warning: unknown[195.231.3.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 16 03:30:38 mail.srvfarm.net postfix/smtpd[2325372]: lost connection after AUTH from unknown[195.231.3.146] May 16 03:34:40 mail.srvfarm.net postfix/smtpd[2325383]: warning: unknown[195.231.3.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-05-16 12:19:03 |
122.51.67.249 | attack | SSH brute force |
2020-05-16 08:59:41 |
206.189.124.251 | attackbots | xmlrpc attack |
2020-05-16 08:52:20 |
159.192.159.177 | attack | tried to hack email |
2020-05-16 10:41:20 |
95.216.9.152 | attackbotsspam | [portscan] Port scan |
2020-05-16 08:44:51 |
27.71.165.128 | attackspam | Attempted connection to port 8000. |
2020-05-16 08:57:02 |
46.151.210.60 | attackspambots | May 15 20:28:11 ny01 sshd[10786]: Failed password for root from 46.151.210.60 port 57340 ssh2 May 15 20:31:30 ny01 sshd[11265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.151.210.60 May 15 20:31:32 ny01 sshd[11265]: Failed password for invalid user test from 46.151.210.60 port 55284 ssh2 |
2020-05-16 08:41:03 |
45.86.67.66 | attack | TCP port 8089: Scan and connection |
2020-05-16 12:01:19 |
51.158.118.70 | attack | Invalid user ebaserdb from 51.158.118.70 port 48362 |
2020-05-16 09:00:51 |
198.20.103.178 | attackspam | scan r |
2020-05-16 08:45:37 |
112.196.97.85 | attackspambots | Fail2Ban - SSH Bruteforce Attempt |
2020-05-16 12:08:29 |
94.241.232.50 | attack | Unauthorized connection attempt from IP address 94.241.232.50 on Port 445(SMB) |
2020-05-16 09:00:27 |
41.232.88.4 | attackbotsspam | SSH bruteforce |
2020-05-16 08:56:34 |