City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.145.72.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49632
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.145.72.55. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:01:39 CST 2025
;; MSG SIZE rcvd: 106
Host 55.72.145.129.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 55.72.145.129.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 110.185.103.79 | attackspambots | Jul 12 02:19:15 meumeu sshd[9272]: Failed password for git from 110.185.103.79 port 57876 ssh2 Jul 12 02:25:27 meumeu sshd[10381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.185.103.79 Jul 12 02:25:29 meumeu sshd[10381]: Failed password for invalid user tg from 110.185.103.79 port 58290 ssh2 ... |
2019-07-12 08:42:42 |
| 165.255.134.140 | attack | Jul 12 01:49:40 shared03 sshd[21029]: Invalid user est from 165.255.134.140 Jul 12 01:49:40 shared03 sshd[21029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.255.134.140 Jul 12 01:49:43 shared03 sshd[21029]: Failed password for invalid user est from 165.255.134.140 port 55966 ssh2 Jul 12 01:49:43 shared03 sshd[21029]: Received disconnect from 165.255.134.140 port 55966:11: Bye Bye [preauth] Jul 12 01:49:43 shared03 sshd[21029]: Disconnected from 165.255.134.140 port 55966 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=165.255.134.140 |
2019-07-12 09:05:35 |
| 156.211.71.10 | attackspam | Lines containing failures of 156.211.71.10 Jul 12 01:51:09 shared11 sshd[31384]: Invalid user admin from 156.211.71.10 port 56795 Jul 12 01:51:09 shared11 sshd[31384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.211.71.10 Jul 12 01:51:11 shared11 sshd[31384]: Failed password for invalid user admin from 156.211.71.10 port 56795 ssh2 Jul 12 01:51:14 shared11 sshd[31384]: Connection closed by invalid user admin 156.211.71.10 port 56795 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=156.211.71.10 |
2019-07-12 09:20:46 |
| 185.176.27.18 | attack | 12.07.2019 00:58:28 Connection to port 49390 blocked by firewall |
2019-07-12 09:20:00 |
| 112.85.42.186 | attackspambots | Jul 12 02:26:41 mail sshd\[10814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186 user=root Jul 12 02:26:43 mail sshd\[10814\]: Failed password for root from 112.85.42.186 port 57666 ssh2 Jul 12 02:26:45 mail sshd\[10814\]: Failed password for root from 112.85.42.186 port 57666 ssh2 Jul 12 02:26:48 mail sshd\[10814\]: Failed password for root from 112.85.42.186 port 57666 ssh2 Jul 12 02:28:11 mail sshd\[11155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.186 user=root |
2019-07-12 08:39:50 |
| 80.37.231.233 | attackspam | Jul 12 06:35:45 vibhu-HP-Z238-Microtower-Workstation sshd\[956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.37.231.233 user=root Jul 12 06:35:47 vibhu-HP-Z238-Microtower-Workstation sshd\[956\]: Failed password for root from 80.37.231.233 port 36812 ssh2 Jul 12 06:44:26 vibhu-HP-Z238-Microtower-Workstation sshd\[2983\]: Invalid user si from 80.37.231.233 Jul 12 06:44:26 vibhu-HP-Z238-Microtower-Workstation sshd\[2983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.37.231.233 Jul 12 06:44:28 vibhu-HP-Z238-Microtower-Workstation sshd\[2983\]: Failed password for invalid user si from 80.37.231.233 port 40442 ssh2 ... |
2019-07-12 09:21:51 |
| 45.227.253.213 | attack | Jul 12 02:07:14 mailserver postfix/anvil[74076]: statistics: max connection rate 2/60s for (smtps:45.227.253.213) at Jul 12 02:05:12 Jul 12 03:13:37 mailserver postfix/smtps/smtpd[74658]: warning: hostname hosting-by.directwebhost.org does not resolve to address 45.227.253.213: hostname nor servname provided, or not known Jul 12 03:13:37 mailserver postfix/smtps/smtpd[74658]: connect from unknown[45.227.253.213] Jul 12 03:13:40 mailserver dovecot: auth-worker(74661): sql([hidden],45.227.253.213): unknown user Jul 12 03:13:42 mailserver postfix/smtps/smtpd[74658]: warning: unknown[45.227.253.213]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 12 03:13:42 mailserver postfix/smtps/smtpd[74658]: lost connection after AUTH from unknown[45.227.253.213] Jul 12 03:13:42 mailserver postfix/smtps/smtpd[74658]: disconnect from unknown[45.227.253.213] Jul 12 03:13:42 mailserver postfix/smtps/smtpd[74658]: warning: hostname hosting-by.directwebhost.org does not resolve to address 45.227.253.213: hostname nor servname |
2019-07-12 09:18:25 |
| 114.67.224.87 | attackbots | Jul 12 01:59:24 tux-35-217 sshd\[29547\]: Invalid user testu from 114.67.224.87 port 43030 Jul 12 01:59:24 tux-35-217 sshd\[29547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.224.87 Jul 12 01:59:27 tux-35-217 sshd\[29547\]: Failed password for invalid user testu from 114.67.224.87 port 43030 ssh2 Jul 12 02:05:11 tux-35-217 sshd\[29603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.224.87 user=root ... |
2019-07-12 09:21:34 |
| 104.244.42.129 | attack | Thu 11 19:08:02 53932/tcp Thu 11 19:08:02 53932/tcp Thu 11 19:08:02 53932/tcp Thu 11 19:08:03 53932/tcp Thu 11 19:08:03 53932/tcp Thu 11 19:08:04 53932/tcp Thu 11 19:08:06 53932/tcp Thu 11 19:08:10 53932/tcp Thu 11 19:08:18 53932/tcp Thu 11 19:08:32 53932/... |
2019-07-12 09:11:52 |
| 36.69.116.183 | attackspam | Jul 12 02:06:46 srv206 sshd[3368]: Invalid user andrey from 36.69.116.183 ... |
2019-07-12 08:42:16 |
| 104.248.175.98 | attack | Jul 12 01:56:17 debian sshd\[18234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.175.98 user=root Jul 12 01:56:19 debian sshd\[18234\]: Failed password for root from 104.248.175.98 port 52208 ssh2 ... |
2019-07-12 09:11:32 |
| 23.9.111.161 | attackbots | Thu 11 18:59:52 53963/tcp Thu 11 18:59:52 53963/tcp Thu 11 18:59:52 53963/tcp Thu 11 18:59:52 53963/tcp Thu 11 18:59:52 53963/tcp Thu 11 18:59:53 53963/tcp Thu 11 18:59:53 53963/tcp Thu 11 18:59:55 53963/tcp Thu 11 18:59:58 53963/tcp Thu 11 19:00:06 53963/... |
2019-07-12 09:14:13 |
| 46.101.204.20 | attack | Jul 12 02:17:59 mail sshd\[9717\]: Invalid user nitin from 46.101.204.20 port 55636 Jul 12 02:17:59 mail sshd\[9717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20 Jul 12 02:18:01 mail sshd\[9717\]: Failed password for invalid user nitin from 46.101.204.20 port 55636 ssh2 Jul 12 02:22:43 mail sshd\[10267\]: Invalid user ts3 from 46.101.204.20 port 56604 Jul 12 02:22:43 mail sshd\[10267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.204.20 |
2019-07-12 08:40:12 |
| 5.196.75.178 | attack | Jul 11 19:26:28 aat-srv002 sshd[23608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.75.178 Jul 11 19:26:30 aat-srv002 sshd[23608]: Failed password for invalid user web5 from 5.196.75.178 port 37476 ssh2 Jul 11 19:33:05 aat-srv002 sshd[23822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.75.178 Jul 11 19:33:07 aat-srv002 sshd[23822]: Failed password for invalid user sebastian from 5.196.75.178 port 42318 ssh2 ... |
2019-07-12 08:45:42 |
| 5.8.48.17 | attackspam | Portscan or hack attempt detected by psad/fwsnort |
2019-07-12 09:06:46 |