City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.71.99.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25918
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;74.71.99.140. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 15:01:26 CST 2025
;; MSG SIZE rcvd: 105
140.99.71.74.in-addr.arpa domain name pointer syn-074-071-099-140.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.99.71.74.in-addr.arpa name = syn-074-071-099-140.res.spectrum.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 115.68.207.48 | attackbots | Oct 31 11:04:36 debian sshd\[29258\]: Invalid user P2012DEV from 115.68.207.48 port 38954 Oct 31 11:04:36 debian sshd\[29258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.68.207.48 Oct 31 11:04:38 debian sshd\[29258\]: Failed password for invalid user P2012DEV from 115.68.207.48 port 38954 ssh2 ... |
2019-10-31 23:33:56 |
| 41.32.210.37 | attackbotsspam | Port scan detected on ports: 5555[TCP], 5555[TCP], 5555[TCP] |
2019-10-31 23:22:47 |
| 211.143.246.38 | attackbots | Oct 31 14:23:27 vps691689 sshd[1440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.246.38 Oct 31 14:23:30 vps691689 sshd[1440]: Failed password for invalid user userftp from 211.143.246.38 port 44728 ssh2 Oct 31 14:29:07 vps691689 sshd[1539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.246.38 ... |
2019-10-31 23:40:54 |
| 14.234.153.85 | attack | Automatic report - Banned IP Access |
2019-10-31 23:34:31 |
| 93.184.151.254 | attackbots | Port 1433 Scan |
2019-10-31 23:32:08 |
| 118.140.244.226 | attackbotsspam | Unauthorized connection attempt from IP address 118.140.244.226 on Port 445(SMB) |
2019-10-31 23:59:32 |
| 212.47.227.129 | attackspam | Automatic report - Banned IP Access |
2019-10-31 23:26:01 |
| 51.91.56.222 | attackbotsspam | www.goldgier.de 51.91.56.222 \[31/Oct/2019:15:58:36 +0100\] "POST /wp-login.php HTTP/1.1" 200 8724 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" goldgier.de 51.91.56.222 \[31/Oct/2019:15:58:36 +0100\] "POST /xmlrpc.php HTTP/1.1" 301 4183 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-10-31 23:24:36 |
| 139.159.27.62 | attackspambots | Oct 31 15:18:52 game-panel sshd[23330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.159.27.62 Oct 31 15:18:54 game-panel sshd[23330]: Failed password for invalid user Test@2016 from 139.159.27.62 port 48582 ssh2 Oct 31 15:24:31 game-panel sshd[23610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.159.27.62 |
2019-10-31 23:46:34 |
| 139.162.23.47 | attackspam | Oct 31 05:10:40 newdogma sshd[29696]: Invalid user abidin from 139.162.23.47 port 43802 Oct 31 05:10:40 newdogma sshd[29696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.162.23.47 Oct 31 05:10:42 newdogma sshd[29696]: Failed password for invalid user abidin from 139.162.23.47 port 43802 ssh2 Oct 31 05:10:42 newdogma sshd[29696]: Received disconnect from 139.162.23.47 port 43802:11: Bye Bye [preauth] Oct 31 05:10:42 newdogma sshd[29696]: Disconnected from 139.162.23.47 port 43802 [preauth] Oct 31 05:22:17 newdogma sshd[29868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.162.23.47 user=r.r Oct 31 05:22:19 newdogma sshd[29868]: Failed password for r.r from 139.162.23.47 port 36166 ssh2 Oct 31 05:22:19 newdogma sshd[29868]: Received disconnect from 139.162.23.47 port 36166:11: Bye Bye [preauth] Oct 31 05:22:19 newdogma sshd[29868]: Disconnected from 139.162.23.47 port 36166 [pre........ ------------------------------- |
2019-10-31 23:37:03 |
| 81.22.45.224 | attackspambots | Portscan or hack attempt detected by psad/fwsnort |
2019-10-31 23:28:31 |
| 218.92.0.192 | attack | Oct 31 15:53:40 legacy sshd[18803]: Failed password for root from 218.92.0.192 port 30385 ssh2 Oct 31 15:57:22 legacy sshd[18927]: Failed password for root from 218.92.0.192 port 64529 ssh2 ... |
2019-10-31 23:41:14 |
| 27.12.13.242 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/27.12.13.242/ CN - 1H : (723) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : CN NAME ASN : ASN4837 IP : 27.12.13.242 CIDR : 27.8.0.0/13 PREFIX COUNT : 1262 UNIQUE IP COUNT : 56665856 ATTACKS DETECTED ASN4837 : 1H - 24 3H - 48 6H - 75 12H - 123 24H - 233 DateTime : 2019-10-31 13:03:20 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-11-01 00:03:31 |
| 185.175.93.14 | attackspam | " " |
2019-11-01 00:04:31 |
| 159.203.190.189 | attackbotsspam | Oct 27 09:18:48 mail sshd[19313]: Failed password for root from 159.203.190.189 port 38404 ssh2 Oct 27 09:22:22 mail sshd[19858]: Failed password for root from 159.203.190.189 port 57203 ssh2 Oct 27 09:25:49 mail sshd[20325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.190.189 |
2019-10-31 23:29:05 |