City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.237.124.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;130.237.124.50. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 17:23:41 CST 2025
;; MSG SIZE rcvd: 107
50.124.237.130.in-addr.arpa domain name pointer c1-akvrhw9j1g9.user.ki.se.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
50.124.237.130.in-addr.arpa name = c1-akvrhw9j1g9.user.ki.se.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
104.248.130.10 | attack | Jun 8 13:49:26 ns382633 sshd\[5810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10 user=root Jun 8 13:49:28 ns382633 sshd\[5810\]: Failed password for root from 104.248.130.10 port 37762 ssh2 Jun 8 14:05:15 ns382633 sshd\[9536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10 user=root Jun 8 14:05:17 ns382633 sshd\[9536\]: Failed password for root from 104.248.130.10 port 35678 ssh2 Jun 8 14:08:27 ns382633 sshd\[9871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10 user=root |
2020-06-08 21:41:18 |
14.29.171.50 | attackbotsspam | Jun 8 14:03:40 vmi345603 sshd[23249]: Failed password for root from 14.29.171.50 port 50983 ssh2 ... |
2020-06-08 21:34:55 |
103.14.33.229 | attackspam | Jun 8 13:54:50 ns382633 sshd\[6911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.14.33.229 user=root Jun 8 13:54:52 ns382633 sshd\[6911\]: Failed password for root from 103.14.33.229 port 50202 ssh2 Jun 8 14:04:51 ns382633 sshd\[9019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.14.33.229 user=root Jun 8 14:04:52 ns382633 sshd\[9019\]: Failed password for root from 103.14.33.229 port 40314 ssh2 Jun 8 14:08:13 ns382633 sshd\[9792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.14.33.229 user=root |
2020-06-08 21:51:15 |
87.138.254.133 | attack | Jun 8 14:03:45 jane sshd[2773]: Failed password for root from 87.138.254.133 port 49944 ssh2 ... |
2020-06-08 22:05:20 |
197.91.155.231 | attack | Jun 8 04:48:22 nandi sshd[17072]: reveeclipse mapping checking getaddrinfo for 197-91-155-231.dsl.mweb.co.za [197.91.155.231] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 8 04:48:22 nandi sshd[17072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.91.155.231 user=r.r Jun 8 04:48:25 nandi sshd[17072]: Failed password for r.r from 197.91.155.231 port 52038 ssh2 Jun 8 04:48:25 nandi sshd[17072]: Received disconnect from 197.91.155.231: 11: Bye Bye [preauth] Jun 8 04:52:33 nandi sshd[18951]: reveeclipse mapping checking getaddrinfo for 197-91-155-231.dsl.mweb.co.za [197.91.155.231] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 8 04:52:33 nandi sshd[18951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.91.155.231 user=r.r Jun 8 04:52:36 nandi sshd[18951]: Failed password for r.r from 197.91.155.231 port 43716 ssh2 Jun 8 04:52:36 nandi sshd[18951]: Received disconnect from 197.91.155.231........ ------------------------------- |
2020-06-08 21:29:06 |
77.108.104.50 | attackspambots | Jun 8 02:00:07 web9 sshd\[12390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.108.104.50 user=root Jun 8 02:00:09 web9 sshd\[12390\]: Failed password for root from 77.108.104.50 port 40397 ssh2 Jun 8 02:04:00 web9 sshd\[12836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.108.104.50 user=root Jun 8 02:04:02 web9 sshd\[12836\]: Failed password for root from 77.108.104.50 port 62937 ssh2 Jun 8 02:08:06 web9 sshd\[13353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.108.104.50 user=root |
2020-06-08 22:00:04 |
118.24.100.198 | attack | Jun 8 15:08:20 server sshd[13015]: Failed password for root from 118.24.100.198 port 54494 ssh2 Jun 8 15:12:55 server sshd[20274]: Failed password for root from 118.24.100.198 port 49150 ssh2 Jun 8 15:17:31 server sshd[25045]: Failed password for root from 118.24.100.198 port 43808 ssh2 |
2020-06-08 22:04:59 |
185.100.87.41 | attack | prod6 ... |
2020-06-08 22:00:54 |
50.116.41.248 | attack | Honeypot hit. |
2020-06-08 21:39:15 |
222.128.117.144 | attackspam | Jun 8 08:08:40 Tower sshd[8525]: Connection from 222.128.117.144 port 41538 on 192.168.10.220 port 22 rdomain "" Jun 8 08:08:42 Tower sshd[8525]: Failed password for root from 222.128.117.144 port 41538 ssh2 Jun 8 08:08:42 Tower sshd[8525]: Received disconnect from 222.128.117.144 port 41538:11: Bye Bye [preauth] Jun 8 08:08:42 Tower sshd[8525]: Disconnected from authenticating user root 222.128.117.144 port 41538 [preauth] |
2020-06-08 21:22:55 |
49.233.26.200 | attack | Jun 8 03:32:54 web9 sshd\[26213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.26.200 user=root Jun 8 03:32:57 web9 sshd\[26213\]: Failed password for root from 49.233.26.200 port 59256 ssh2 Jun 8 03:36:49 web9 sshd\[26757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.26.200 user=root Jun 8 03:36:51 web9 sshd\[26757\]: Failed password for root from 49.233.26.200 port 44152 ssh2 Jun 8 03:40:38 web9 sshd\[27938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.26.200 user=root |
2020-06-08 21:52:01 |
212.129.57.201 | attackspam | Jun 8 13:03:40 rush sshd[2529]: Failed password for root from 212.129.57.201 port 57366 ssh2 Jun 8 13:08:03 rush sshd[2671]: Failed password for root from 212.129.57.201 port 47774 ssh2 ... |
2020-06-08 21:28:43 |
45.82.153.131 | attack | RDP Bruteforce |
2020-06-08 21:48:40 |
195.54.160.225 | attackbotsspam | Jun 8 15:39:54 debian kernel: [522551.699731] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=195.54.160.225 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=62187 PROTO=TCP SPT=45123 DPT=2824 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-08 21:35:37 |
222.186.175.163 | attackspambots | 2020-06-08T13:57:19.505556shield sshd\[22563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163 user=root 2020-06-08T13:57:21.971579shield sshd\[22563\]: Failed password for root from 222.186.175.163 port 26638 ssh2 2020-06-08T13:57:25.621873shield sshd\[22563\]: Failed password for root from 222.186.175.163 port 26638 ssh2 2020-06-08T13:57:29.028879shield sshd\[22563\]: Failed password for root from 222.186.175.163 port 26638 ssh2 2020-06-08T13:57:32.646026shield sshd\[22563\]: Failed password for root from 222.186.175.163 port 26638 ssh2 |
2020-06-08 21:58:12 |