City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.163.66.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8167
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.163.66.18. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062901 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 30 07:29:52 CST 2025
;; MSG SIZE rcvd: 105
Host 18.66.163.13.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 18.66.163.13.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 37.37.223.249 | attackbotsspam | 1586090446 - 04/05/2020 14:40:46 Host: 37.37.223.249/37.37.223.249 Port: 22 TCP Blocked |
2020-04-06 02:11:17 |
| 180.168.201.126 | attackspambots | SSH Authentication Attempts Exceeded |
2020-04-06 02:47:01 |
| 195.154.164.235 | attack | Fail2Ban - SSH Bruteforce Attempt |
2020-04-06 02:27:10 |
| 64.225.105.247 | attackspam | Apr 5 18:12:25 host01 sshd[27720]: Failed password for root from 64.225.105.247 port 52034 ssh2 Apr 5 18:16:09 host01 sshd[28403]: Failed password for root from 64.225.105.247 port 34012 ssh2 ... |
2020-04-06 02:15:24 |
| 132.248.96.3 | attack | Apr 5 19:51:33 mail sshd\[2961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.96.3 user=root Apr 5 19:51:34 mail sshd\[2961\]: Failed password for root from 132.248.96.3 port 46124 ssh2 Apr 5 19:59:59 mail sshd\[3327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.96.3 user=root ... |
2020-04-06 02:34:25 |
| 183.56.213.81 | attack | Apr 5 16:04:06 v22019038103785759 sshd\[4632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.56.213.81 user=root Apr 5 16:04:08 v22019038103785759 sshd\[4632\]: Failed password for root from 183.56.213.81 port 51672 ssh2 Apr 5 16:08:33 v22019038103785759 sshd\[4917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.56.213.81 user=root Apr 5 16:08:35 v22019038103785759 sshd\[4917\]: Failed password for root from 183.56.213.81 port 33096 ssh2 Apr 5 16:10:59 v22019038103785759 sshd\[5089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.56.213.81 user=root ... |
2020-04-06 02:38:17 |
| 222.186.180.147 | attackspam | Apr 5 20:22:55 santamaria sshd\[16983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147 user=root Apr 5 20:22:56 santamaria sshd\[16983\]: Failed password for root from 222.186.180.147 port 33304 ssh2 Apr 5 20:23:00 santamaria sshd\[16983\]: Failed password for root from 222.186.180.147 port 33304 ssh2 ... |
2020-04-06 02:26:50 |
| 211.75.236.230 | attackspam | Brute-force attempt banned |
2020-04-06 02:22:30 |
| 187.190.236.88 | attackbots | $f2bV_matches |
2020-04-06 02:46:50 |
| 95.85.38.127 | attack | Apr 5 19:48:32 nextcloud sshd\[3994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.38.127 user=root Apr 5 19:48:35 nextcloud sshd\[3994\]: Failed password for root from 95.85.38.127 port 40502 ssh2 Apr 5 19:52:44 nextcloud sshd\[11885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.38.127 user=root |
2020-04-06 02:39:42 |
| 210.97.40.34 | attack | SSH Brute-Force reported by Fail2Ban |
2020-04-06 02:22:02 |
| 115.84.91.63 | attackbotsspam | Apr 5 20:44:39 pkdns2 sshd\[28319\]: Failed password for root from 115.84.91.63 port 46214 ssh2Apr 5 20:46:34 pkdns2 sshd\[28527\]: Failed password for root from 115.84.91.63 port 43908 ssh2Apr 5 20:47:52 pkdns2 sshd\[28656\]: Failed password for root from 115.84.91.63 port 60808 ssh2Apr 5 20:48:56 pkdns2 sshd\[28788\]: Failed password for root from 115.84.91.63 port 49480 ssh2Apr 5 20:50:06 pkdns2 sshd\[28869\]: Failed password for root from 115.84.91.63 port 38146 ssh2Apr 5 20:51:05 pkdns2 sshd\[29042\]: Failed password for root from 115.84.91.63 port 55036 ssh2 ... |
2020-04-06 02:16:53 |
| 81.82.208.124 | attackspam | Honeypot attack, port: 5555, PTR: d5152d07c.static.telenet.be. |
2020-04-06 02:22:51 |
| 220.167.100.60 | attackspambots | $f2bV_matches_ltvn |
2020-04-06 02:17:51 |
| 186.179.153.129 | attack | Automatic report - Port Scan Attack |
2020-04-06 02:13:52 |