City: unknown
Region: unknown
Country: China
Internet Service Provider: China Unicom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.138.100.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58523
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;116.138.100.52. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025010300 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 03 14:37:59 CST 2025
;; MSG SIZE rcvd: 107
Host 52.100.138.116.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 52.100.138.116.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
153.101.29.178 | attack | Jul 11 22:41:22 abendstille sshd\[25140\]: Invalid user jake from 153.101.29.178 Jul 11 22:41:22 abendstille sshd\[25140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.101.29.178 Jul 11 22:41:24 abendstille sshd\[25140\]: Failed password for invalid user jake from 153.101.29.178 port 52966 ssh2 Jul 11 22:44:52 abendstille sshd\[28902\]: Invalid user redmine from 153.101.29.178 Jul 11 22:44:52 abendstille sshd\[28902\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.101.29.178 ... |
2020-07-12 04:57:54 |
46.0.199.27 | attackbots | Jul 11 22:40:33 h2779839 sshd[21685]: Invalid user weisiyu from 46.0.199.27 port 50202 Jul 11 22:40:33 h2779839 sshd[21685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.0.199.27 Jul 11 22:40:33 h2779839 sshd[21685]: Invalid user weisiyu from 46.0.199.27 port 50202 Jul 11 22:40:35 h2779839 sshd[21685]: Failed password for invalid user weisiyu from 46.0.199.27 port 50202 ssh2 Jul 11 22:43:52 h2779839 sshd[21778]: Invalid user user from 46.0.199.27 port 47920 Jul 11 22:43:52 h2779839 sshd[21778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.0.199.27 Jul 11 22:43:52 h2779839 sshd[21778]: Invalid user user from 46.0.199.27 port 47920 Jul 11 22:43:54 h2779839 sshd[21778]: Failed password for invalid user user from 46.0.199.27 port 47920 ssh2 Jul 11 22:47:06 h2779839 sshd[21871]: Invalid user lingna from 46.0.199.27 port 45642 ... |
2020-07-12 05:28:14 |
104.248.130.10 | attack | 2020-07-11T21:02:43.559059shield sshd\[5259\]: Invalid user gcy from 104.248.130.10 port 45302 2020-07-11T21:02:43.568032shield sshd\[5259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10 2020-07-11T21:02:46.138154shield sshd\[5259\]: Failed password for invalid user gcy from 104.248.130.10 port 45302 ssh2 2020-07-11T21:05:46.452891shield sshd\[6196\]: Invalid user sultan from 104.248.130.10 port 43198 2020-07-11T21:05:46.462642shield sshd\[6196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10 |
2020-07-12 05:16:25 |
140.246.224.162 | attackbotsspam | Jul 11 22:50:27 buvik sshd[13204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.224.162 Jul 11 22:50:29 buvik sshd[13204]: Failed password for invalid user redmine from 140.246.224.162 port 57212 ssh2 Jul 11 22:58:40 buvik sshd[14272]: Invalid user mono from 140.246.224.162 ... |
2020-07-12 05:26:44 |
54.38.33.178 | attack | 2020-07-11T20:47:49.243827shield sshd\[32357\]: Invalid user sunfang from 54.38.33.178 port 39950 2020-07-11T20:47:49.253250shield sshd\[32357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.ip-54-38-33.eu 2020-07-11T20:47:51.098746shield sshd\[32357\]: Failed password for invalid user sunfang from 54.38.33.178 port 39950 ssh2 2020-07-11T20:50:52.873953shield sshd\[806\]: Invalid user nagios from 54.38.33.178 port 35782 2020-07-11T20:50:52.883629shield sshd\[806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.ip-54-38-33.eu |
2020-07-12 05:05:27 |
112.3.30.78 | attackspambots | Invalid user ilog from 112.3.30.78 port 42648 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.3.30.78 Invalid user ilog from 112.3.30.78 port 42648 Failed password for invalid user ilog from 112.3.30.78 port 42648 ssh2 Invalid user zhang_xie from 112.3.30.78 port 53186 |
2020-07-12 05:03:09 |
46.38.145.249 | attackspambots | Jul 11 23:15:09 relay postfix/smtpd\[20456\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 11 23:15:53 relay postfix/smtpd\[15382\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 11 23:16:13 relay postfix/smtpd\[20451\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 11 23:17:02 relay postfix/smtpd\[15382\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 11 23:17:17 relay postfix/smtpd\[20455\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-12 05:17:54 |
49.233.183.15 | attackspam | Jul 12 03:42:46 webhost01 sshd[15611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.183.15 Jul 12 03:42:48 webhost01 sshd[15611]: Failed password for invalid user becka from 49.233.183.15 port 55970 ssh2 ... |
2020-07-12 05:05:52 |
222.186.169.194 | attackbotsspam | Jul 11 23:24:16 nextcloud sshd\[4104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root Jul 11 23:24:18 nextcloud sshd\[4104\]: Failed password for root from 222.186.169.194 port 41168 ssh2 Jul 11 23:24:34 nextcloud sshd\[4426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root |
2020-07-12 05:26:22 |
112.85.42.188 | attack | 07/11/2020-17:26:24.633900 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan |
2020-07-12 05:28:31 |
61.177.172.142 | attack | Failed password for invalid user from 61.177.172.142 port 12830 ssh2 |
2020-07-12 05:03:34 |
49.235.240.105 | attackspambots | Jul 12 02:59:29 itv-usvr-01 sshd[7565]: Invalid user ssq from 49.235.240.105 Jul 12 02:59:29 itv-usvr-01 sshd[7565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.240.105 Jul 12 02:59:29 itv-usvr-01 sshd[7565]: Invalid user ssq from 49.235.240.105 Jul 12 02:59:31 itv-usvr-01 sshd[7565]: Failed password for invalid user ssq from 49.235.240.105 port 58298 ssh2 Jul 12 03:07:30 itv-usvr-01 sshd[7933]: Invalid user max from 49.235.240.105 |
2020-07-12 05:14:52 |
80.82.65.253 | attackspambots | Jul 11 22:27:24 debian-2gb-nbg1-2 kernel: \[16757826.408894\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.65.253 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=1860 PROTO=TCP SPT=42977 DPT=59126 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-07-12 05:07:28 |
106.12.99.204 | attackspambots | Jul 11 22:00:07 l03 sshd[11767]: Invalid user jessie from 106.12.99.204 port 47276 ... |
2020-07-12 05:08:23 |
106.13.95.100 | attackspambots | Jul 11 23:10:03 sso sshd[12231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.95.100 Jul 11 23:10:05 sso sshd[12231]: Failed password for invalid user ishana from 106.13.95.100 port 33292 ssh2 ... |
2020-07-12 05:25:06 |