City: Lynchburg
Region: Virginia
Country: United States
Internet Service Provider: Verizon
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.57.74.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;108.57.74.194. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012000 1800 900 604800 86400
;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 01:25:15 CST 2025
;; MSG SIZE rcvd: 106
194.74.57.108.in-addr.arpa domain name pointer pool-108-57-74-194.lyncva.east.verizon.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
194.74.57.108.in-addr.arpa name = pool-108-57-74-194.lyncva.east.verizon.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
191.241.242.91 | attackbots | 1597290462 - 08/13/2020 05:47:42 Host: 191.241.242.91/191.241.242.91 Port: 445 TCP Blocked |
2020-08-13 19:01:00 |
188.217.181.18 | attack | 2020-08-13T15:05:53.534438hostname sshd[20436]: Failed password for root from 188.217.181.18 port 34548 ssh2 2020-08-13T15:09:54.079152hostname sshd[21611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-188-217-181-18.cust.vodafonedsl.it user=root 2020-08-13T15:09:56.100587hostname sshd[21611]: Failed password for root from 188.217.181.18 port 44200 ssh2 ... |
2020-08-13 19:03:00 |
104.248.147.78 | attack | Aug 13 10:12:31 localhost sshd[87347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.147.78 user=root Aug 13 10:12:34 localhost sshd[87347]: Failed password for root from 104.248.147.78 port 41068 ssh2 Aug 13 10:16:48 localhost sshd[88277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.147.78 user=root Aug 13 10:16:50 localhost sshd[88277]: Failed password for root from 104.248.147.78 port 51556 ssh2 Aug 13 10:21:14 localhost sshd[89061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.147.78 user=root Aug 13 10:21:15 localhost sshd[89061]: Failed password for root from 104.248.147.78 port 33820 ssh2 ... |
2020-08-13 18:42:29 |
118.24.119.49 | attack | Aug 13 05:53:47 ns382633 sshd\[26199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.119.49 user=root Aug 13 05:53:48 ns382633 sshd\[26199\]: Failed password for root from 118.24.119.49 port 57924 ssh2 Aug 13 05:59:59 ns382633 sshd\[27228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.119.49 user=root Aug 13 06:00:01 ns382633 sshd\[27228\]: Failed password for root from 118.24.119.49 port 33266 ssh2 Aug 13 06:03:18 ns382633 sshd\[28045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.119.49 user=root |
2020-08-13 18:51:19 |
181.52.249.177 | attack | 2020-08-13T11:59:31.863104amanda2.illicoweb.com sshd\[28939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.52.249.177 user=root 2020-08-13T11:59:34.450110amanda2.illicoweb.com sshd\[28939\]: Failed password for root from 181.52.249.177 port 52428 ssh2 2020-08-13T12:03:51.665361amanda2.illicoweb.com sshd\[29091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.52.249.177 user=root 2020-08-13T12:03:53.278804amanda2.illicoweb.com sshd\[29091\]: Failed password for root from 181.52.249.177 port 57592 ssh2 2020-08-13T12:08:24.286258amanda2.illicoweb.com sshd\[29322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.52.249.177 user=root ... |
2020-08-13 18:49:24 |
45.145.67.163 | attack |
|
2020-08-13 18:54:32 |
51.254.22.172 | attack | 2020-08-13T05:41:02.887306sorsha.thespaminator.com sshd[11966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.22.172 user=root 2020-08-13T05:41:04.229790sorsha.thespaminator.com sshd[11966]: Failed password for root from 51.254.22.172 port 36492 ssh2 ... |
2020-08-13 18:36:22 |
106.13.189.158 | attackbots | Aug 13 10:38:41 itv-usvr-01 sshd[2602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.189.158 user=root Aug 13 10:38:43 itv-usvr-01 sshd[2602]: Failed password for root from 106.13.189.158 port 35192 ssh2 Aug 13 10:43:23 itv-usvr-01 sshd[2952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.189.158 user=root Aug 13 10:43:25 itv-usvr-01 sshd[2952]: Failed password for root from 106.13.189.158 port 34833 ssh2 Aug 13 10:48:01 itv-usvr-01 sshd[3155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.189.158 user=root Aug 13 10:48:03 itv-usvr-01 sshd[3155]: Failed password for root from 106.13.189.158 port 34476 ssh2 |
2020-08-13 18:47:20 |
180.244.122.143 | attackspam | 1597290488 - 08/13/2020 05:48:08 Host: 180.244.122.143/180.244.122.143 Port: 445 TCP Blocked |
2020-08-13 18:44:25 |
101.83.43.56 | attack | $f2bV_matches |
2020-08-13 19:05:07 |
134.19.219.34 | attack | Port scan on 2 port(s): 22 8291 |
2020-08-13 19:06:31 |
118.126.90.89 | attackspambots | Failed password for root from 118.126.90.89 port 45972 ssh2 |
2020-08-13 18:55:16 |
190.108.228.45 | attackbotsspam | Port Scan ... |
2020-08-13 18:34:10 |
139.219.234.171 | attackbotsspam | Aug 13 05:47:56 kh-dev-server sshd[3487]: Failed password for root from 139.219.234.171 port 10112 ssh2 ... |
2020-08-13 18:50:55 |
128.14.230.200 | attackbotsspam | Aug 13 08:04:13 fhem-rasp sshd[9983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.14.230.200 user=root Aug 13 08:04:15 fhem-rasp sshd[9983]: Failed password for root from 128.14.230.200 port 52526 ssh2 ... |
2020-08-13 19:14:05 |