City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.237.55.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29332
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.237.55.21. IN A
;; AUTHORITY SECTION:
. 10 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:48:46 CST 2022
;; MSG SIZE rcvd: 106
21.55.237.104.in-addr.arpa domain name pointer 104-237-55-21.static.webnx.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
21.55.237.104.in-addr.arpa name = 104-237-55-21.static.webnx.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.38.71.174 | attackspambots | Apr 5 15:32:36 server1 sshd\[4527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.71.174 user=root Apr 5 15:32:38 server1 sshd\[4527\]: Failed password for root from 51.38.71.174 port 48616 ssh2 Apr 5 15:37:40 server1 sshd\[5835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.71.174 user=root Apr 5 15:37:42 server1 sshd\[5835\]: Failed password for root from 51.38.71.174 port 34920 ssh2 Apr 5 15:42:31 server1 sshd\[7266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.71.174 user=root ... |
2020-04-06 06:04:30 |
| 222.186.175.217 | attack | 2020-04-06T00:01:56.032700rocketchat.forhosting.nl sshd[8618]: Failed password for root from 222.186.175.217 port 39362 ssh2 2020-04-06T00:01:59.050978rocketchat.forhosting.nl sshd[8618]: Failed password for root from 222.186.175.217 port 39362 ssh2 2020-04-06T00:02:02.937442rocketchat.forhosting.nl sshd[8618]: Failed password for root from 222.186.175.217 port 39362 ssh2 ... |
2020-04-06 06:08:43 |
| 122.114.157.7 | attack | Apr 5 17:39:25 Tower sshd[41383]: Connection from 122.114.157.7 port 54746 on 192.168.10.220 port 22 rdomain "" Apr 5 17:39:26 Tower sshd[41383]: Failed password for root from 122.114.157.7 port 54746 ssh2 Apr 5 17:39:27 Tower sshd[41383]: Received disconnect from 122.114.157.7 port 54746:11: Bye Bye [preauth] Apr 5 17:39:27 Tower sshd[41383]: Disconnected from authenticating user root 122.114.157.7 port 54746 [preauth] |
2020-04-06 06:03:17 |
| 83.134.192.199 | attackspambots | SSH invalid-user multiple login try |
2020-04-06 05:52:59 |
| 210.227.113.18 | attackspambots | Apr 5 23:39:43 [HOSTNAME] sshd[28713]: User **removed** from 210.227.113.18 not allowed because not listed in AllowUsers Apr 5 23:39:43 [HOSTNAME] sshd[28713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.227.113.18 user=**removed** Apr 5 23:39:45 [HOSTNAME] sshd[28713]: Failed password for invalid user **removed** from 210.227.113.18 port 44010 ssh2 ... |
2020-04-06 06:07:41 |
| 188.41.241.69 | attackspam | Apr 6 00:04:01 meumeu sshd[27901]: Failed password for git from 188.41.241.69 port 56568 ssh2 Apr 6 00:06:20 meumeu sshd[28191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.41.241.69 Apr 6 00:06:22 meumeu sshd[28191]: Failed password for invalid user test from 188.41.241.69 port 34872 ssh2 ... |
2020-04-06 06:09:06 |
| 139.59.161.78 | attackspam | Brute force attempt |
2020-04-06 06:01:17 |
| 51.83.72.243 | attack | Apr 5 23:22:56 Ubuntu-1404-trusty-64-minimal sshd\[20658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.72.243 user=root Apr 5 23:22:57 Ubuntu-1404-trusty-64-minimal sshd\[20658\]: Failed password for root from 51.83.72.243 port 34690 ssh2 Apr 5 23:36:51 Ubuntu-1404-trusty-64-minimal sshd\[32304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.72.243 user=root Apr 5 23:36:53 Ubuntu-1404-trusty-64-minimal sshd\[32304\]: Failed password for root from 51.83.72.243 port 32950 ssh2 Apr 5 23:40:11 Ubuntu-1404-trusty-64-minimal sshd\[2210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.72.243 user=root |
2020-04-06 05:43:59 |
| 134.175.102.133 | attackspam | Apr 5 23:30:28 srv206 sshd[19516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.102.133 user=root Apr 5 23:30:30 srv206 sshd[19516]: Failed password for root from 134.175.102.133 port 35704 ssh2 Apr 5 23:40:01 srv206 sshd[19581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.102.133 user=root Apr 5 23:40:03 srv206 sshd[19581]: Failed password for root from 134.175.102.133 port 55360 ssh2 ... |
2020-04-06 05:49:08 |
| 152.32.216.240 | attackspam | Apr 5 23:36:15 * sshd[32734]: Failed password for root from 152.32.216.240 port 53320 ssh2 |
2020-04-06 05:52:07 |
| 139.162.115.221 | attackbotsspam | firewall-block, port(s): 9000/tcp |
2020-04-06 05:47:10 |
| 203.230.6.175 | attackbotsspam | Apr 6 05:32:24 f sshd\[31616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.230.6.175 user=root Apr 6 05:32:26 f sshd\[31616\]: Failed password for root from 203.230.6.175 port 44192 ssh2 Apr 6 05:38:47 f sshd\[31752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.230.6.175 user=root ... |
2020-04-06 05:48:24 |
| 138.204.78.249 | attack | Brute force SMTP login attempted. ... |
2020-04-06 05:48:50 |
| 51.77.194.232 | attackspambots | $f2bV_matches |
2020-04-06 06:06:01 |
| 178.32.221.142 | attack | Apr 5 23:30:20 vpn01 sshd[20531]: Failed password for root from 178.32.221.142 port 47321 ssh2 ... |
2020-04-06 06:04:02 |