City: unknown
Region: unknown
Country: Latvia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.254.136.183
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45237
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.254.136.183. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 13:59:26 CST 2025
;; MSG SIZE rcvd: 107
183.136.254.89.in-addr.arpa domain name pointer host.ostkom.lv.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
183.136.254.89.in-addr.arpa name = host.ostkom.lv.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 211.151.95.139 | attackbots | Automatic report - Banned IP Access |
2019-08-07 17:08:07 |
| 39.66.170.152 | attackbots | [Aegis] @ 2019-08-07 07:59:47 0100 -> Attempt to use mail server as relay (550: Requested action not taken). |
2019-08-07 17:43:12 |
| 198.179.79.134 | attackbotsspam | Automatic report - Port Scan Attack |
2019-08-07 17:45:16 |
| 176.115.104.12 | attackbotsspam | [portscan] Port scan |
2019-08-07 18:13:06 |
| 27.151.138.29 | attack | FTP brute-force attack |
2019-08-07 17:28:31 |
| 106.12.93.25 | attackspam | Aug 7 07:58:51 mail sshd\[15901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.25 user=root Aug 7 07:58:53 mail sshd\[15901\]: Failed password for root from 106.12.93.25 port 36118 ssh2 ... |
2019-08-07 18:32:57 |
| 114.40.168.34 | attack | 19/8/7@03:00:26: FAIL: IoT-Telnet address from=114.40.168.34 ... |
2019-08-07 17:48:34 |
| 219.237.74.24 | attackspam | Aug 7 10:16:30 vserver sshd\[13641\]: Invalid user note from 219.237.74.24Aug 7 10:16:32 vserver sshd\[13641\]: Failed password for invalid user note from 219.237.74.24 port 53679 ssh2Aug 7 10:19:59 vserver sshd\[13665\]: Invalid user student from 219.237.74.24Aug 7 10:20:01 vserver sshd\[13665\]: Failed password for invalid user student from 219.237.74.24 port 40808 ssh2 ... |
2019-08-07 17:44:39 |
| 112.85.42.232 | attack | Aug 7 15:09:57 vibhu-HP-Z238-Microtower-Workstation sshd\[9922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232 user=root Aug 7 15:09:59 vibhu-HP-Z238-Microtower-Workstation sshd\[9922\]: Failed password for root from 112.85.42.232 port 38313 ssh2 Aug 7 15:10:03 vibhu-HP-Z238-Microtower-Workstation sshd\[9922\]: Failed password for root from 112.85.42.232 port 38313 ssh2 Aug 7 15:19:42 vibhu-HP-Z238-Microtower-Workstation sshd\[10190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232 user=root Aug 7 15:19:45 vibhu-HP-Z238-Microtower-Workstation sshd\[10190\]: Failed password for root from 112.85.42.232 port 14905 ssh2 ... |
2019-08-07 17:54:34 |
| 37.143.160.18 | attackbotsspam | Aug 7 10:38:34 localhost sshd\[3978\]: Invalid user smhyun from 37.143.160.18 port 56828 Aug 7 10:38:34 localhost sshd\[3978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.143.160.18 Aug 7 10:38:36 localhost sshd\[3978\]: Failed password for invalid user smhyun from 37.143.160.18 port 56828 ssh2 |
2019-08-07 17:15:24 |
| 77.40.33.227 | attackspam | Brute force attempt |
2019-08-07 17:39:51 |
| 106.13.2.226 | attack | SSH/22 MH Probe, BF, Hack - |
2019-08-07 18:20:52 |
| 114.39.29.66 | attackbotsspam | : |
2019-08-07 17:23:16 |
| 185.69.153.247 | attack | Aug 7 11:14:55 meumeu sshd[17831]: Failed password for invalid user golf from 185.69.153.247 port 47642 ssh2 Aug 7 11:19:45 meumeu sshd[18326]: Failed password for invalid user barbara from 185.69.153.247 port 44288 ssh2 Aug 7 11:24:26 meumeu sshd[18795]: Failed password for invalid user weblogic from 185.69.153.247 port 41046 ssh2 ... |
2019-08-07 17:46:34 |
| 54.255.201.28 | attackbotsspam | GET /manager/html |
2019-08-07 17:28:06 |