City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.249.39.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51361
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.249.39.61. IN A
;; AUTHORITY SECTION:
. 523 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:20:44 CST 2022
;; MSG SIZE rcvd: 105
61.39.249.13.in-addr.arpa domain name pointer server-13-249-39-61.iad89.r.cloudfront.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
61.39.249.13.in-addr.arpa name = server-13-249-39-61.iad89.r.cloudfront.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.38.189.150 | attack | SSH invalid-user multiple login try |
2019-10-18 14:16:16 |
| 106.12.83.164 | attackbots | Oct 17 19:25:40 sachi sshd\[394\]: Invalid user qf from 106.12.83.164 Oct 17 19:25:40 sachi sshd\[394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.83.164 Oct 17 19:25:42 sachi sshd\[394\]: Failed password for invalid user qf from 106.12.83.164 port 45466 ssh2 Oct 17 19:31:12 sachi sshd\[867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.83.164 user=root Oct 17 19:31:14 sachi sshd\[867\]: Failed password for root from 106.12.83.164 port 55642 ssh2 |
2019-10-18 14:49:51 |
| 192.42.116.17 | attackbots | Oct 18 05:52:44 rotator sshd\[28156\]: Failed password for root from 192.42.116.17 port 47140 ssh2Oct 18 05:52:47 rotator sshd\[28156\]: Failed password for root from 192.42.116.17 port 47140 ssh2Oct 18 05:52:49 rotator sshd\[28156\]: Failed password for root from 192.42.116.17 port 47140 ssh2Oct 18 05:52:51 rotator sshd\[28156\]: Failed password for root from 192.42.116.17 port 47140 ssh2Oct 18 05:52:54 rotator sshd\[28156\]: Failed password for root from 192.42.116.17 port 47140 ssh2Oct 18 05:52:56 rotator sshd\[28156\]: Failed password for root from 192.42.116.17 port 47140 ssh2 ... |
2019-10-18 14:40:06 |
| 86.61.66.59 | attackspambots | $f2bV_matches |
2019-10-18 14:16:28 |
| 45.55.20.128 | attackspambots | Oct 18 08:35:58 tux-35-217 sshd\[26802\]: Invalid user \*963 from 45.55.20.128 port 36310 Oct 18 08:35:58 tux-35-217 sshd\[26802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.20.128 Oct 18 08:36:00 tux-35-217 sshd\[26802\]: Failed password for invalid user \*963 from 45.55.20.128 port 36310 ssh2 Oct 18 08:40:24 tux-35-217 sshd\[26831\]: Invalid user elicon from 45.55.20.128 port 55857 Oct 18 08:40:24 tux-35-217 sshd\[26831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.20.128 ... |
2019-10-18 14:41:41 |
| 60.250.23.105 | attackbotsspam | Oct 18 07:53:15 localhost sshd\[9071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.23.105 user=root Oct 18 07:53:17 localhost sshd\[9071\]: Failed password for root from 60.250.23.105 port 50712 ssh2 Oct 18 07:56:57 localhost sshd\[9435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.23.105 user=root |
2019-10-18 14:18:00 |
| 139.59.20.248 | attackbotsspam | Oct 18 04:10:53 www_kotimaassa_fi sshd[23452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.20.248 Oct 18 04:10:56 www_kotimaassa_fi sshd[23452]: Failed password for invalid user student from 139.59.20.248 port 57666 ssh2 ... |
2019-10-18 14:22:55 |
| 198.98.52.143 | attackspambots | Oct 18 07:09:50 rotator sshd\[8984\]: Address 198.98.52.143 maps to tor-exit.jwhite.network, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Oct 18 07:09:52 rotator sshd\[8984\]: Failed password for root from 198.98.52.143 port 56072 ssh2Oct 18 07:09:54 rotator sshd\[8984\]: Failed password for root from 198.98.52.143 port 56072 ssh2Oct 18 07:09:56 rotator sshd\[8984\]: Failed password for root from 198.98.52.143 port 56072 ssh2Oct 18 07:09:59 rotator sshd\[8984\]: Failed password for root from 198.98.52.143 port 56072 ssh2Oct 18 07:10:02 rotator sshd\[8984\]: Failed password for root from 198.98.52.143 port 56072 ssh2 ... |
2019-10-18 14:44:53 |
| 159.203.201.54 | attackspam | Honeypot hit. |
2019-10-18 14:34:22 |
| 198.200.124.197 | attackspambots | Oct 18 00:36:49 ny01 sshd[5602]: Failed password for root from 198.200.124.197 port 34548 ssh2 Oct 18 00:40:30 ny01 sshd[5947]: Failed password for root from 198.200.124.197 port 45522 ssh2 |
2019-10-18 14:35:48 |
| 106.12.199.27 | attackspam | Oct 18 06:54:35 vtv3 sshd\[6662\]: Invalid user admin02 from 106.12.199.27 port 48454 Oct 18 06:54:35 vtv3 sshd\[6662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.199.27 Oct 18 06:54:37 vtv3 sshd\[6662\]: Failed password for invalid user admin02 from 106.12.199.27 port 48454 ssh2 Oct 18 06:58:57 vtv3 sshd\[8812\]: Invalid user ubnt from 106.12.199.27 port 58022 Oct 18 06:58:57 vtv3 sshd\[8812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.199.27 Oct 18 07:12:33 vtv3 sshd\[15442\]: Invalid user jn from 106.12.199.27 port 58542 Oct 18 07:12:33 vtv3 sshd\[15442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.199.27 Oct 18 07:12:35 vtv3 sshd\[15442\]: Failed password for invalid user jn from 106.12.199.27 port 58542 ssh2 Oct 18 07:17:05 vtv3 sshd\[17821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12. |
2019-10-18 14:39:26 |
| 94.237.76.61 | attackbots | Oct 17 03:43:57 newdogma sshd[9033]: Invalid user minecraft from 94.237.76.61 port 46738 Oct 17 03:43:57 newdogma sshd[9033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.237.76.61 Oct 17 03:44:00 newdogma sshd[9033]: Failed password for invalid user minecraft from 94.237.76.61 port 46738 ssh2 Oct 17 03:44:00 newdogma sshd[9033]: Received disconnect from 94.237.76.61 port 46738:11: Bye Bye [preauth] Oct 17 03:44:00 newdogma sshd[9033]: Disconnected from 94.237.76.61 port 46738 [preauth] Oct 17 03:59:59 newdogma sshd[9158]: Invalid user samuel from 94.237.76.61 port 34882 Oct 17 03:59:59 newdogma sshd[9158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.237.76.61 Oct 17 04:00:01 newdogma sshd[9158]: Failed password for invalid user samuel from 94.237.76.61 port 34882 ssh2 Oct 17 04:00:01 newdogma sshd[9158]: Received disconnect from 94.237.76.61 port 34882:11: Bye Bye [preauth] Oct........ ------------------------------- |
2019-10-18 14:19:39 |
| 185.158.134.214 | attack | Automatic report - Banned IP Access |
2019-10-18 14:24:04 |
| 139.99.37.130 | attack | Oct 18 03:52:56 work-partkepr sshd\[16929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.37.130 user=root Oct 18 03:52:57 work-partkepr sshd\[16929\]: Failed password for root from 139.99.37.130 port 2472 ssh2 ... |
2019-10-18 14:45:39 |
| 2.95.39.10 | attackspambots | Oct 18 05:42:47 toyboy sshd[31686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.95.39.10 user=r.r Oct 18 05:42:49 toyboy sshd[31686]: Failed password for r.r from 2.95.39.10 port 44673 ssh2 Oct 18 05:42:51 toyboy sshd[31686]: Failed password for r.r from 2.95.39.10 port 44673 ssh2 Oct 18 05:42:54 toyboy sshd[31686]: Failed password for r.r from 2.95.39.10 port 44673 ssh2 Oct 18 05:42:57 toyboy sshd[31686]: Failed password for r.r from 2.95.39.10 port 44673 ssh2 Oct 18 05:42:59 toyboy sshd[31686]: Failed password for r.r from 2.95.39.10 port 44673 ssh2 Oct 18 05:43:01 toyboy sshd[31686]: Failed password for r.r from 2.95.39.10 port 44673 ssh2 Oct 18 05:43:01 toyboy sshd[31686]: Disconnecting: Too many authentication failures for r.r from 2.95.39.10 port 44673 ssh2 [preauth] Oct 18 05:43:01 toyboy sshd[31686]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.95.39.10 user=r.r ........ ---------------------------------------------- |
2019-10-18 14:46:26 |