City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.145.152.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62261
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.145.152.150. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 13:36:26 CST 2025
;; MSG SIZE rcvd: 108
Host 150.152.145.129.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 150.152.145.129.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 123.201.81.50 | attack | Unauthorized connection attempt from IP address 123.201.81.50 on Port 445(SMB) |
2019-09-10 03:16:17 |
| 122.172.70.244 | attackspambots | (sshd) Failed SSH login from 122.172.70.244 (abts-kk-dynamic-244.70.172.122.airtelbroadband.in): 5 in the last 3600 secs |
2019-09-10 03:23:34 |
| 69.16.201.246 | attackspambots | 2019-09-09T18:45:47.249127abusebot.cloudsearch.cf sshd\[7910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.16.201.246 user=root |
2019-09-10 03:16:53 |
| 181.48.134.66 | attack | Sep 9 19:07:30 dev0-dcde-rnet sshd[12030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.134.66 Sep 9 19:07:32 dev0-dcde-rnet sshd[12030]: Failed password for invalid user csgo-server from 181.48.134.66 port 42156 ssh2 Sep 9 19:15:16 dev0-dcde-rnet sshd[12142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.134.66 |
2019-09-10 03:13:30 |
| 166.111.80.44 | attackbotsspam | Sep 9 17:33:24 rpi sshd[10126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.111.80.44 Sep 9 17:33:26 rpi sshd[10126]: Failed password for invalid user vmuser from 166.111.80.44 port 57068 ssh2 |
2019-09-10 03:06:27 |
| 51.254.220.20 | attack | Sep 9 20:44:24 SilenceServices sshd[7915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.220.20 Sep 9 20:44:26 SilenceServices sshd[7915]: Failed password for invalid user postgres from 51.254.220.20 port 33025 ssh2 Sep 9 20:49:41 SilenceServices sshd[11828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.220.20 |
2019-09-10 03:01:02 |
| 13.235.234.228 | attack | Sep 10 02:09:02 webhost01 sshd[4595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.235.234.228 Sep 10 02:09:04 webhost01 sshd[4595]: Failed password for invalid user mailtest from 13.235.234.228 port 58638 ssh2 ... |
2019-09-10 03:25:54 |
| 191.54.239.109 | attack | Unauthorized connection attempt from IP address 191.54.239.109 on Port 445(SMB) |
2019-09-10 03:18:37 |
| 197.54.251.211 | attack | $f2bV_matches |
2019-09-10 03:21:00 |
| 158.69.121.157 | attackspam | Sep 9 15:18:08 ny01 sshd[7479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.121.157 Sep 9 15:18:11 ny01 sshd[7479]: Failed password for invalid user test from 158.69.121.157 port 38234 ssh2 Sep 9 15:23:50 ny01 sshd[8635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.121.157 |
2019-09-10 03:32:18 |
| 121.23.142.117 | attackspambots | $f2bV_matches |
2019-09-10 03:09:15 |
| 14.63.169.33 | attack | Sep 9 14:55:12 xtremcommunity sshd\[150432\]: Invalid user www from 14.63.169.33 port 59316 Sep 9 14:55:12 xtremcommunity sshd\[150432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.169.33 Sep 9 14:55:14 xtremcommunity sshd\[150432\]: Failed password for invalid user www from 14.63.169.33 port 59316 ssh2 Sep 9 15:02:26 xtremcommunity sshd\[150633\]: Invalid user newuser from 14.63.169.33 port 34058 Sep 9 15:02:26 xtremcommunity sshd\[150633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.169.33 ... |
2019-09-10 03:04:09 |
| 68.183.88.59 | attackbots | Sep 9 21:38:58 core sshd[21890]: Invalid user 1 from 68.183.88.59 port 48466 Sep 9 21:39:00 core sshd[21890]: Failed password for invalid user 1 from 68.183.88.59 port 48466 ssh2 ... |
2019-09-10 03:42:36 |
| 154.66.219.20 | attackspam | Sep 9 11:56:35 aat-srv002 sshd[18443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.66.219.20 Sep 9 11:56:37 aat-srv002 sshd[18443]: Failed password for invalid user git from 154.66.219.20 port 51330 ssh2 Sep 9 12:05:05 aat-srv002 sshd[18684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.66.219.20 Sep 9 12:05:07 aat-srv002 sshd[18684]: Failed password for invalid user zabbix from 154.66.219.20 port 57962 ssh2 ... |
2019-09-10 03:33:03 |
| 201.220.85.62 | attackbotsspam | Unauthorized connection attempt from IP address 201.220.85.62 on Port 445(SMB) |
2019-09-10 03:14:46 |