City: Uyo
Region: Akwa Ibom State
Country: Nigeria
Internet Service Provider: MTN
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.90.30.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43068
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;102.90.30.66. IN A
;; AUTHORITY SECTION:
. 332 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010702 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 08 09:13:23 CST 2022
;; MSG SIZE rcvd: 105
Host 66.30.90.102.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 66.30.90.102.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
125.99.173.162 | attackspambots | Apr 10 23:56:55 vpn01 sshd[26139]: Failed password for root from 125.99.173.162 port 34804 ssh2 ... |
2020-04-11 06:58:23 |
34.69.115.56 | attack | 2020-04-11T00:35:28.106977amanda2.illicoweb.com sshd\[45420\]: Invalid user localhost from 34.69.115.56 port 58284 2020-04-11T00:35:28.109587amanda2.illicoweb.com sshd\[45420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=56.115.69.34.bc.googleusercontent.com 2020-04-11T00:35:29.874376amanda2.illicoweb.com sshd\[45420\]: Failed password for invalid user localhost from 34.69.115.56 port 58284 ssh2 2020-04-11T00:44:39.351602amanda2.illicoweb.com sshd\[46021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=56.115.69.34.bc.googleusercontent.com user=root 2020-04-11T00:44:41.741390amanda2.illicoweb.com sshd\[46021\]: Failed password for root from 34.69.115.56 port 36182 ssh2 ... |
2020-04-11 06:52:44 |
87.251.74.7 | attack | Multiport scan : 25 ports scanned 257 300 310 1604 2221 3387 3872 4490 6689 7010 7312 8008 8940 9043 9389 9951 11222 28000 33385 33908 33911 33922 51015 52525 63389 |
2020-04-11 06:41:10 |
198.98.62.183 | attackspam | 5683/udp 389/udp 1900/udp... [2020-02-16/04-10]129pkt,5pt.(udp) |
2020-04-11 06:56:14 |
192.241.202.169 | attackbots | Apr 10 18:40:51 NPSTNNYC01T sshd[6364]: Failed password for root from 192.241.202.169 port 41050 ssh2 Apr 10 18:43:27 NPSTNNYC01T sshd[7057]: Failed password for root from 192.241.202.169 port 54734 ssh2 ... |
2020-04-11 07:02:16 |
182.74.25.246 | attack | SSH Invalid Login |
2020-04-11 07:05:01 |
95.167.169.222 | attack | 445/tcp 445/tcp 445/tcp [2020-02-27/04-10]3pkt |
2020-04-11 06:38:06 |
171.244.43.52 | attack | SSH Brute Force |
2020-04-11 07:08:18 |
122.51.67.249 | attackspam | SSH Invalid Login |
2020-04-11 06:58:38 |
51.255.173.41 | attackspambots | Apr 11 00:15:43 cvbnet sshd[24294]: Failed password for root from 51.255.173.41 port 36644 ssh2 ... |
2020-04-11 06:46:37 |
176.113.70.60 | attack | 1900/udp 1900/udp 1900/udp... [2020-02-10/04-10]1412pkt,1pt.(udp) |
2020-04-11 06:36:20 |
201.20.42.129 | attackbots | 445/tcp 445/tcp 445/tcp... [2020-02-11/04-10]31pkt,1pt.(tcp) |
2020-04-11 06:33:04 |
185.36.81.57 | attackbots | Rude login attack (56 tries in 1d) |
2020-04-11 06:35:13 |
111.229.90.2 | attackbotsspam | SSH Brute-Forcing (server1) |
2020-04-11 06:31:26 |
179.53.207.156 | attackbots | SSH Brute Force |
2020-04-11 06:56:59 |