City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.159.72.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33573
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.159.72.138. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:11:18 CST 2025
;; MSG SIZE rcvd: 106
138.72.159.99.in-addr.arpa domain name pointer 99-159-72-138.lightspeed.tukrga.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
138.72.159.99.in-addr.arpa name = 99-159-72-138.lightspeed.tukrga.sbcglobal.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
62.234.95.136 | attack | Dec 16 12:07:09 srv01 sshd[4979]: Invalid user brmlaw from 62.234.95.136 port 36645 Dec 16 12:07:09 srv01 sshd[4979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.95.136 Dec 16 12:07:09 srv01 sshd[4979]: Invalid user brmlaw from 62.234.95.136 port 36645 Dec 16 12:07:11 srv01 sshd[4979]: Failed password for invalid user brmlaw from 62.234.95.136 port 36645 ssh2 Dec 16 12:12:55 srv01 sshd[5541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.95.136 user=mysql Dec 16 12:12:57 srv01 sshd[5541]: Failed password for mysql from 62.234.95.136 port 35386 ssh2 ... |
2019-12-16 19:42:38 |
201.211.218.80 | attackbotsspam | Brute forcing RDP port 3389 |
2019-12-16 19:46:42 |
40.92.71.78 | attackspambots | Dec 16 14:18:05 debian-2gb-vpn-nbg1-1 kernel: [873454.615516] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.71.78 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=237 ID=50898 DF PROTO=TCP SPT=64595 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0 |
2019-12-16 19:37:47 |
222.68.173.10 | attack | $f2bV_matches |
2019-12-16 19:46:09 |
41.87.80.26 | attackspam | Dec 16 01:00:21 php1 sshd\[2294\]: Invalid user lushbaugh from 41.87.80.26 Dec 16 01:00:21 php1 sshd\[2294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.87.80.26 Dec 16 01:00:23 php1 sshd\[2294\]: Failed password for invalid user lushbaugh from 41.87.80.26 port 15554 ssh2 Dec 16 01:06:22 php1 sshd\[2865\]: Invalid user kranitz from 41.87.80.26 Dec 16 01:06:22 php1 sshd\[2865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.87.80.26 |
2019-12-16 19:24:01 |
14.221.36.127 | attackspambots | Scanning |
2019-12-16 19:38:12 |
40.92.72.75 | attackbots | Dec 16 11:08:46 debian-2gb-vpn-nbg1-1 kernel: [862096.012101] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.72.75 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=5586 DF PROTO=TCP SPT=33812 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0 |
2019-12-16 19:40:23 |
167.71.229.184 | attack | Dec 15 16:33:49 server sshd\[1201\]: Failed password for invalid user nicas from 167.71.229.184 port 48758 ssh2 Dec 16 12:19:07 server sshd\[7669\]: Invalid user vyjayanthi from 167.71.229.184 Dec 16 12:19:07 server sshd\[7669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.229.184 Dec 16 12:19:08 server sshd\[7669\]: Failed password for invalid user vyjayanthi from 167.71.229.184 port 45290 ssh2 Dec 16 12:27:13 server sshd\[10270\]: Invalid user is from 167.71.229.184 ... |
2019-12-16 19:46:56 |
60.166.88.37 | attackspambots | FTP/21 MH Probe, BF, Hack - |
2019-12-16 19:11:08 |
84.39.33.80 | attackbots | Dec 16 11:33:45 cp sshd[30542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.39.33.80 |
2019-12-16 19:39:53 |
69.94.131.76 | attackbots | Lines containing failures of 69.94.131.76 Dec 16 07:06:35 shared01 postfix/smtpd[7505]: connect from cap.holidayincape.com[69.94.131.76] Dec 16 07:06:35 shared01 policyd-spf[7757]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=69.94.131.76; helo=cap.mdreallistings.com; envelope-from=x@x Dec x@x Dec 16 07:06:36 shared01 postfix/smtpd[7505]: disconnect from cap.holidayincape.com[69.94.131.76] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5 Dec 16 07:08:12 shared01 postfix/smtpd[7505]: connect from cap.holidayincape.com[69.94.131.76] Dec 16 07:08:12 shared01 policyd-spf[7757]: prepend Received-SPF: Pass (mailfrom) identhostnamey=mailfrom; client-ip=69.94.131.76; helo=cap.mdreallistings.com; envelope-from=x@x Dec x@x Dec 16 07:08:12 shared01 postfix/smtpd[7505]: disconnect from cap.holidayincape.com[69.94.131.76] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5 Dec 16 07:08:59 shared01 postfix/smtpd[7505]: connect from cap.holida........ ------------------------------ |
2019-12-16 19:16:36 |
37.187.99.3 | attackspambots | Dec 16 18:26:05 webhost01 sshd[8457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.99.3 Dec 16 18:26:07 webhost01 sshd[8457]: Failed password for invalid user georgy from 37.187.99.3 port 56146 ssh2 ... |
2019-12-16 19:45:45 |
49.145.202.209 | attackbots | Unauthorised access (Dec 16) SRC=49.145.202.209 LEN=60 TTL=117 ID=15503 DF TCP DPT=445 WINDOW=8192 SYN |
2019-12-16 19:19:26 |
163.172.21.100 | attackbotsspam | Dec 16 09:07:07 heissa sshd\[16801\]: Invalid user meltsch from 163.172.21.100 port 42964 Dec 16 09:07:07 heissa sshd\[16801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163-172-21-100.rev.poneytelecom.eu Dec 16 09:07:09 heissa sshd\[16801\]: Failed password for invalid user meltsch from 163.172.21.100 port 42964 ssh2 Dec 16 09:11:41 heissa sshd\[17666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163-172-21-100.rev.poneytelecom.eu user=mysql Dec 16 09:11:42 heissa sshd\[17666\]: Failed password for mysql from 163.172.21.100 port 48916 ssh2 |
2019-12-16 19:18:10 |
179.95.247.52 | attackbotsspam | Dec 15 23:28:23 wbs sshd\[24292\]: Invalid user teamspeak from 179.95.247.52 Dec 15 23:28:23 wbs sshd\[24292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.95.247.52 Dec 15 23:28:24 wbs sshd\[24292\]: Failed password for invalid user teamspeak from 179.95.247.52 port 36691 ssh2 Dec 15 23:37:58 wbs sshd\[25144\]: Invalid user testingred52 from 179.95.247.52 Dec 15 23:37:58 wbs sshd\[25144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.95.247.52 |
2019-12-16 19:19:52 |