City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.54.80.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4875
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.54.80.105. IN A
;; AUTHORITY SECTION:
. 397 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022040201 1800 900 604800 86400
;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 03 06:04:15 CST 2022
;; MSG SIZE rcvd: 106
105.80.54.104.in-addr.arpa domain name pointer 104-54-80-105.lightspeed.frokca.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
105.80.54.104.in-addr.arpa name = 104-54-80-105.lightspeed.frokca.sbcglobal.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
62.234.141.48 | attackspam | Oct 20 08:46:36 TORMINT sshd\[22878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.141.48 user=root Oct 20 08:46:38 TORMINT sshd\[22878\]: Failed password for root from 62.234.141.48 port 49364 ssh2 Oct 20 08:52:00 TORMINT sshd\[23140\]: Invalid user norman from 62.234.141.48 Oct 20 08:52:00 TORMINT sshd\[23140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.141.48 ... |
2019-10-20 21:06:11 |
191.7.152.13 | attackspambots | Oct 20 13:59:34 OPSO sshd\[12377\]: Invalid user zxcvbnm from 191.7.152.13 port 44702 Oct 20 13:59:34 OPSO sshd\[12377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.7.152.13 Oct 20 13:59:37 OPSO sshd\[12377\]: Failed password for invalid user zxcvbnm from 191.7.152.13 port 44702 ssh2 Oct 20 14:03:56 OPSO sshd\[13373\]: Invalid user 123456 from 191.7.152.13 port 55436 Oct 20 14:03:56 OPSO sshd\[13373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.7.152.13 |
2019-10-20 21:37:10 |
78.0.25.209 | attack | Oct 20 14:55:22 meumeu sshd[1078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.0.25.209 Oct 20 14:55:25 meumeu sshd[1078]: Failed password for invalid user 1q2w3e4r5t1a2s3d4f5g from 78.0.25.209 port 36002 ssh2 Oct 20 15:01:46 meumeu sshd[2128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.0.25.209 ... |
2019-10-20 21:18:18 |
222.186.169.192 | attack | Oct 20 20:27:47 lcl-usvr-02 sshd[5743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192 user=root Oct 20 20:27:49 lcl-usvr-02 sshd[5743]: Failed password for root from 222.186.169.192 port 54796 ssh2 ... |
2019-10-20 21:40:15 |
35.187.223.41 | attackspambots | Oct 19 22:14:20 ACSRAM auth.info sshd[8331]: Invalid user raquel from 35.187.223.41 port 59454 Oct 19 22:14:20 ACSRAM auth.info sshd[8331]: Failed password for invalid user raquel from 35.187.223.41 port 59454 ssh2 Oct 19 22:14:20 ACSRAM auth.notice sshguard[2844]: Attack from "35.187.223.41" on service 100 whostnameh danger 10. Oct 19 22:14:20 ACSRAM auth.notice sshguard[2844]: Attack from "35.187.223.41" on service 100 whostnameh danger 10. Oct 19 22:14:20 ACSRAM auth.info sshd[8331]: Received disconnect from 35.187.223.41 port 59454:11: Bye Bye [preauth] Oct 19 22:14:20 ACSRAM auth.info sshd[8331]: Disconnected from 35.187.223.41 port 59454 [preauth] Oct 19 22:14:21 ACSRAM auth.notice sshguard[2844]: Attack from "35.187.223.41" on service 100 whostnameh danger 10. Oct 19 22:14:21 ACSRAM auth.warn sshguard[2844]: Blocking "35.187.223.41/32" forever (3 attacks in 1 secs, after 2 abuses over 1789 secs.) ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=35.187. |
2019-10-20 21:22:10 |
188.165.211.99 | attack | Oct 20 12:46:57 localhost sshd\[80035\]: Invalid user maik from 188.165.211.99 port 59442 Oct 20 12:46:57 localhost sshd\[80035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.211.99 Oct 20 12:46:59 localhost sshd\[80035\]: Failed password for invalid user maik from 188.165.211.99 port 59442 ssh2 Oct 20 12:50:55 localhost sshd\[80149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.211.99 user=root Oct 20 12:50:56 localhost sshd\[80149\]: Failed password for root from 188.165.211.99 port 42324 ssh2 ... |
2019-10-20 21:01:28 |
222.186.173.238 | attack | Oct 20 13:04:25 sshgateway sshd\[19536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238 user=root Oct 20 13:04:27 sshgateway sshd\[19536\]: Failed password for root from 222.186.173.238 port 59934 ssh2 Oct 20 13:04:44 sshgateway sshd\[19536\]: error: maximum authentication attempts exceeded for root from 222.186.173.238 port 59934 ssh2 \[preauth\] |
2019-10-20 21:09:26 |
163.172.72.190 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.72.190 user=root Failed password for root from 163.172.72.190 port 60664 ssh2 Invalid user com2011 from 163.172.72.190 port 45384 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.72.190 Failed password for invalid user com2011 from 163.172.72.190 port 45384 ssh2 |
2019-10-20 21:02:07 |
91.214.221.231 | attackbotsspam | DATE:2019-10-20 14:04:51, IP:91.214.221.231, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc) |
2019-10-20 21:03:00 |
73.55.248.84 | attack | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/73.55.248.84/ US - 1H : (228) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : US NAME ASN : ASN7922 IP : 73.55.248.84 CIDR : 73.0.0.0/8 PREFIX COUNT : 1512 UNIQUE IP COUNT : 70992640 ATTACKS DETECTED ASN7922 : 1H - 1 3H - 6 6H - 9 12H - 14 24H - 25 DateTime : 2019-10-20 14:04:49 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-20 21:03:20 |
107.170.63.221 | attackbots | SSH Bruteforce |
2019-10-20 21:04:03 |
185.40.12.178 | attack | " " |
2019-10-20 21:33:02 |
13.126.222.2 | attack | Oct 20 14:04:11 mc1 kernel: \[2859408.683206\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=13.126.222.2 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x20 TTL=235 ID=54321 PROTO=TCP SPT=49420 DPT=6379 WINDOW=65535 RES=0x00 SYN URGP=0 Oct 20 14:04:23 mc1 kernel: \[2859420.195351\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=13.126.222.2 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x20 TTL=235 ID=54321 PROTO=TCP SPT=53579 DPT=6380 WINDOW=65535 RES=0x00 SYN URGP=0 Oct 20 14:04:35 mc1 kernel: \[2859432.167812\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=13.126.222.2 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x20 TTL=235 ID=54321 PROTO=TCP SPT=48189 DPT=2375 WINDOW=65535 RES=0x00 SYN URGP=0 ... |
2019-10-20 21:12:19 |
166.70.207.2 | attackbots | Oct 20 14:04:21 rotator sshd\[4600\]: Failed password for root from 166.70.207.2 port 36540 ssh2Oct 20 14:04:24 rotator sshd\[4600\]: Failed password for root from 166.70.207.2 port 36540 ssh2Oct 20 14:04:27 rotator sshd\[4600\]: Failed password for root from 166.70.207.2 port 36540 ssh2Oct 20 14:04:30 rotator sshd\[4600\]: Failed password for root from 166.70.207.2 port 36540 ssh2Oct 20 14:04:33 rotator sshd\[4600\]: Failed password for root from 166.70.207.2 port 36540 ssh2Oct 20 14:04:36 rotator sshd\[4600\]: Failed password for root from 166.70.207.2 port 36540 ssh2 ... |
2019-10-20 21:09:49 |
91.215.244.12 | attackbotsspam | $f2bV_matches |
2019-10-20 21:33:42 |