City: Houston
Region: Texas
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: AT&T Services, Inc.
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.4.58.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1005
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.4.58.45. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019053100 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 31 19:28:11 CST 2019
;; MSG SIZE rcvd: 115
45.58.4.104.in-addr.arpa domain name pointer 104-4-58-45.lightspeed.hstntx.sbcglobal.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
45.58.4.104.in-addr.arpa name = 104-4-58-45.lightspeed.hstntx.sbcglobal.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
118.25.143.199 | attackbots | 2019-11-21T10:48:27.745162abusebot-8.cloudsearch.cf sshd\[6342\]: Invalid user stimler from 118.25.143.199 port 51044 |
2019-11-21 19:32:08 |
218.23.104.250 | attackbots | Nov 21 09:37:17 srv01 sshd[19503]: Invalid user mokkarala from 218.23.104.250 port 44952 Nov 21 09:37:17 srv01 sshd[19503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.23.104.250 Nov 21 09:37:17 srv01 sshd[19503]: Invalid user mokkarala from 218.23.104.250 port 44952 Nov 21 09:37:19 srv01 sshd[19503]: Failed password for invalid user mokkarala from 218.23.104.250 port 44952 ssh2 Nov 21 09:41:23 srv01 sshd[19902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.23.104.250 user=root Nov 21 09:41:24 srv01 sshd[19902]: Failed password for root from 218.23.104.250 port 51268 ssh2 ... |
2019-11-21 19:05:40 |
49.88.112.77 | attackbots | Nov 21 10:36:55 *** sshd[8244]: User root from 49.88.112.77 not allowed because not listed in AllowUsers |
2019-11-21 19:12:59 |
157.33.191.134 | attack | Port scan on 2 port(s): 445 65529 |
2019-11-21 19:10:23 |
184.105.139.94 | attackspam | Honeypot hit. |
2019-11-21 19:20:41 |
49.67.197.124 | attackbotsspam | Unauthorized connection attempt from IP address 49.67.197.124 on Port 139(NETBIOS) |
2019-11-21 19:05:18 |
182.254.198.221 | attack | 11/21/2019-01:24:24.841959 182.254.198.221 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-11-21 19:17:44 |
189.51.142.185 | attackbotsspam | DATE:2019-11-21 07:23:55, IP:189.51.142.185, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2019-11-21 19:35:50 |
202.182.123.185 | attackbots | Nov 20 20:14:23 linuxrulz sshd[7233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.182.123.185 user=r.r Nov 20 20:14:25 linuxrulz sshd[7233]: Failed password for r.r from 202.182.123.185 port 50463 ssh2 Nov 20 20:14:25 linuxrulz sshd[7233]: Received disconnect from 202.182.123.185 port 50463:11: Bye Bye [preauth] Nov 20 20:14:25 linuxrulz sshd[7233]: Disconnected from 202.182.123.185 port 50463 [preauth] Nov 20 20:39:13 linuxrulz sshd[10993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.182.123.185 user=backup Nov 20 20:39:15 linuxrulz sshd[10993]: Failed password for backup from 202.182.123.185 port 34459 ssh2 Nov 20 20:39:15 linuxrulz sshd[10993]: Received disconnect from 202.182.123.185 port 34459:11: Bye Bye [preauth] Nov 20 20:39:15 linuxrulz sshd[10993]: Disconnected from 202.182.123.185 port 34459 [preauth] Nov 20 20:43:02 linuxrulz sshd[11666]: Invalid user scott from........ ------------------------------- |
2019-11-21 19:01:04 |
175.119.91.147 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-11-21 19:19:42 |
82.125.149.167 | attackbotsspam | $f2bV_matches |
2019-11-21 19:15:19 |
74.82.215.70 | attackbots | Nov 21 07:21:00 linuxrulz sshd[16594]: Invalid user stepanek from 74.82.215.70 port 59588 Nov 21 07:21:00 linuxrulz sshd[16594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.82.215.70 Nov 21 07:21:01 linuxrulz sshd[16594]: Failed password for invalid user stepanek from 74.82.215.70 port 59588 ssh2 Nov 21 07:21:01 linuxrulz sshd[16594]: Received disconnect from 74.82.215.70 port 59588:11: Bye Bye [preauth] Nov 21 07:21:01 linuxrulz sshd[16594]: Disconnected from 74.82.215.70 port 59588 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=74.82.215.70 |
2019-11-21 19:21:10 |
95.27.164.84 | attack | Honeypot attack, port: 445, PTR: 95-27-164-84.broadband.corbina.ru. |
2019-11-21 19:02:33 |
49.88.112.112 | attackbots | Nov 21 11:04:59 work-partkepr sshd\[32549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.112 user=root Nov 21 11:05:01 work-partkepr sshd\[32549\]: Failed password for root from 49.88.112.112 port 26530 ssh2 ... |
2019-11-21 19:14:19 |
66.70.189.209 | attack | Nov 21 08:26:31 SilenceServices sshd[23442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.209 Nov 21 08:26:33 SilenceServices sshd[23442]: Failed password for invalid user itsd from 66.70.189.209 port 37315 ssh2 Nov 21 08:30:11 SilenceServices sshd[24518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.209 |
2019-11-21 19:06:09 |