City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.52.95.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53990
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.52.95.1. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:49:29 CST 2025
;; MSG SIZE rcvd: 104
1.95.52.104.in-addr.arpa domain name pointer 104-52-95-1.lightspeed.knvltn.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
1.95.52.104.in-addr.arpa name = 104-52-95-1.lightspeed.knvltn.sbcglobal.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 183.165.28.37 | attackbots | Jun 3 07:53:46 ntop sshd[24707]: User r.r from 183.165.28.37 not allowed because not listed in AllowUsers Jun 3 07:53:46 ntop sshd[24707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.165.28.37 user=r.r Jun 3 07:53:48 ntop sshd[24707]: Failed password for invalid user r.r from 183.165.28.37 port 54317 ssh2 Jun 3 07:53:49 ntop sshd[24707]: Received disconnect from 183.165.28.37 port 54317:11: Bye Bye [preauth] Jun 3 07:53:49 ntop sshd[24707]: Disconnected from invalid user r.r 183.165.28.37 port 54317 [preauth] Jun 3 07:58:39 ntop sshd[25575]: User r.r from 183.165.28.37 not allowed because not listed in AllowUsers Jun 3 07:58:39 ntop sshd[25575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.165.28.37 user=r.r Jun 3 07:58:41 ntop sshd[25575]: Failed password for invalid user r.r from 183.165.28.37 port 46281 ssh2 Jun 3 07:58:42 ntop sshd[25575]: Received disconnect fr........ ------------------------------- |
2020-06-03 22:46:52 |
| 216.243.31.2 | attackspam | firewall-block, port(s): 80/tcp |
2020-06-03 22:34:38 |
| 188.166.78.16 | attack | Jun 3 14:47:21 journals sshd\[2321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.78.16 user=root Jun 3 14:47:23 journals sshd\[2321\]: Failed password for root from 188.166.78.16 port 52504 ssh2 Jun 3 14:51:08 journals sshd\[33128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.78.16 user=root Jun 3 14:51:10 journals sshd\[33128\]: Failed password for root from 188.166.78.16 port 55419 ssh2 Jun 3 14:55:03 journals sshd\[33888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.78.16 user=root ... |
2020-06-03 22:14:20 |
| 202.51.126.4 | attackbotsspam | Jun 3 15:38:01 pve1 sshd[14838]: Failed password for root from 202.51.126.4 port 43991 ssh2 ... |
2020-06-03 22:16:05 |
| 77.247.108.119 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 70 - port: 5038 proto: TCP cat: Misc Attack |
2020-06-03 22:29:38 |
| 195.54.161.15 | attack | ET DROP Dshield Block Listed Source group 1 - port: 27017 proto: TCP cat: Misc Attack |
2020-06-03 22:31:50 |
| 181.208.131.232 | attack | xmlrpc attack |
2020-06-03 22:14:55 |
| 139.162.122.110 | attack | SSH Brute Force |
2020-06-03 22:42:31 |
| 5.188.86.174 | attackspam | Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-03T13:49:16Z and 2020-06-03T14:20:32Z |
2020-06-03 22:53:40 |
| 59.36.18.195 | attackbotsspam | 2020-06-03T16:07:37.896969sd-86998 sshd[14396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.18.195 user=root 2020-06-03T16:07:39.793683sd-86998 sshd[14396]: Failed password for root from 59.36.18.195 port 53904 ssh2 2020-06-03T16:12:08.288136sd-86998 sshd[15751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.18.195 user=root 2020-06-03T16:12:10.390311sd-86998 sshd[15751]: Failed password for root from 59.36.18.195 port 50807 ssh2 2020-06-03T16:16:55.290099sd-86998 sshd[17425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.18.195 user=root 2020-06-03T16:16:56.790324sd-86998 sshd[17425]: Failed password for root from 59.36.18.195 port 47715 ssh2 ... |
2020-06-03 22:22:31 |
| 84.236.96.65 | attackspambots | Jun 3 16:13:26 vps647732 sshd[3666]: Failed password for root from 84.236.96.65 port 56044 ssh2 ... |
2020-06-03 22:38:25 |
| 134.19.147.46 | attackspam | 1591185280 - 06/03/2020 13:54:40 Host: 134.19.147.46/134.19.147.46 Port: 445 TCP Blocked |
2020-06-03 22:31:24 |
| 182.222.119.174 | attack | SSH brute-force attempt |
2020-06-03 22:12:01 |
| 103.45.149.67 | attackbotsspam | Jun 3 15:57:31 PorscheCustomer sshd[9391]: Failed password for root from 103.45.149.67 port 34414 ssh2 Jun 3 16:01:38 PorscheCustomer sshd[9525]: Failed password for root from 103.45.149.67 port 52868 ssh2 ... |
2020-06-03 22:52:03 |
| 159.89.48.222 | attackspambots | xmlrpc attack |
2020-06-03 22:39:42 |