City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.2.103.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11484
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.2.103.74. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 06:17:58 CST 2025
;; MSG SIZE rcvd: 105
b'Host 74.103.2.137.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 137.2.103.74.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 180.242.235.64 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 08-04-2020 22:50:09. |
2020-04-09 06:55:03 |
| 222.186.175.23 | attackbots | Apr 9 01:10:04 dcd-gentoo sshd[21263]: User root from 222.186.175.23 not allowed because none of user's groups are listed in AllowGroups Apr 9 01:10:07 dcd-gentoo sshd[21263]: error: PAM: Authentication failure for illegal user root from 222.186.175.23 Apr 9 01:10:04 dcd-gentoo sshd[21263]: User root from 222.186.175.23 not allowed because none of user's groups are listed in AllowGroups Apr 9 01:10:07 dcd-gentoo sshd[21263]: error: PAM: Authentication failure for illegal user root from 222.186.175.23 Apr 9 01:10:04 dcd-gentoo sshd[21263]: User root from 222.186.175.23 not allowed because none of user's groups are listed in AllowGroups Apr 9 01:10:07 dcd-gentoo sshd[21263]: error: PAM: Authentication failure for illegal user root from 222.186.175.23 Apr 9 01:10:07 dcd-gentoo sshd[21263]: Failed keyboard-interactive/pam for invalid user root from 222.186.175.23 port 25084 ssh2 ... |
2020-04-09 07:10:56 |
| 107.6.246.41 | attackbots | firewall-block, port(s): 1900/udp |
2020-04-09 06:55:58 |
| 149.28.105.73 | attackspambots | Apr 9 00:40:43 host5 sshd[1267]: Invalid user postgres from 149.28.105.73 port 37968 ... |
2020-04-09 07:08:58 |
| 122.155.204.128 | attackspam | Apr 9 00:16:24 vps333114 sshd[2675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.204.128 Apr 9 00:16:26 vps333114 sshd[2675]: Failed password for invalid user t7inst from 122.155.204.128 port 43682 ssh2 ... |
2020-04-09 06:44:44 |
| 52.156.152.50 | attackspam | 2020-04-08T21:54:20.289473abusebot-5.cloudsearch.cf sshd[2717]: Invalid user www-data from 52.156.152.50 port 42540 2020-04-08T21:54:20.296125abusebot-5.cloudsearch.cf sshd[2717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=iredmail.westus2.cloudapp.azure.com 2020-04-08T21:54:20.289473abusebot-5.cloudsearch.cf sshd[2717]: Invalid user www-data from 52.156.152.50 port 42540 2020-04-08T21:54:21.820911abusebot-5.cloudsearch.cf sshd[2717]: Failed password for invalid user www-data from 52.156.152.50 port 42540 ssh2 2020-04-08T21:58:05.445602abusebot-5.cloudsearch.cf sshd[2722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=iredmail.westus2.cloudapp.azure.com user=ftp 2020-04-08T21:58:06.863339abusebot-5.cloudsearch.cf sshd[2722]: Failed password for ftp from 52.156.152.50 port 35044 ssh2 2020-04-08T22:01:46.849847abusebot-5.cloudsearch.cf sshd[2782]: Invalid user webmaster from 52.156.152.50 port 55744 ... |
2020-04-09 07:01:25 |
| 138.94.20.66 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 08-04-2020 22:50:08. |
2020-04-09 06:57:27 |
| 211.220.27.191 | attackspambots | Apr 9 00:15:36 plex sshd[18379]: Invalid user photos from 211.220.27.191 port 58784 Apr 9 00:15:38 plex sshd[18379]: Failed password for invalid user photos from 211.220.27.191 port 58784 ssh2 Apr 9 00:15:36 plex sshd[18379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.220.27.191 Apr 9 00:15:36 plex sshd[18379]: Invalid user photos from 211.220.27.191 port 58784 Apr 9 00:15:38 plex sshd[18379]: Failed password for invalid user photos from 211.220.27.191 port 58784 ssh2 |
2020-04-09 06:53:43 |
| 49.235.134.46 | attack | Apr 8 21:50:13 work-partkepr sshd\[30283\]: User postgres from 49.235.134.46 not allowed because not listed in AllowUsers Apr 8 21:50:13 work-partkepr sshd\[30283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.134.46 user=postgres ... |
2020-04-09 06:56:24 |
| 43.226.146.134 | attack | Apr 8 18:59:06 mail sshd\[7749\]: Invalid user test from 43.226.146.134 Apr 8 18:59:06 mail sshd\[7749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.146.134 ... |
2020-04-09 07:03:25 |
| 87.251.74.13 | attackspambots | Multiport scan : 34 ports scanned 2795 4124 5895 6444 6876 7229 7891 8238 8416 8768 8916 9222 10819 11629 12035 12161 13022 14222 14300 16273 17047 17556 18004 19740 22234 33948 33987 41162 47830 50556 58218 61283 64541 64898 |
2020-04-09 07:00:09 |
| 183.129.48.5 | attackspam | 2020-04-08 16:27:27 H=(163.com) [183.129.48.5]:56134 I=[192.147.25.65]:25 F= |
2020-04-09 07:20:21 |
| 180.76.248.85 | attackspam | SASL PLAIN auth failed: ruser=... |
2020-04-09 07:20:05 |
| 52.236.161.207 | attack | Apr 8 23:37:04 zulu1842 sshd[16574]: Invalid user smuthuv from 52.236.161.207 Apr 8 23:37:04 zulu1842 sshd[16574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.236.161.207 Apr 8 23:37:06 zulu1842 sshd[16574]: Failed password for invalid user smuthuv from 52.236.161.207 port 46130 ssh2 Apr 8 23:37:06 zulu1842 sshd[16574]: Received disconnect from 52.236.161.207: 11: Bye Bye [preauth] Apr 8 23:49:22 zulu1842 sshd[17404]: Invalid user ftpuser from 52.236.161.207 Apr 8 23:49:22 zulu1842 sshd[17404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.236.161.207 Apr 8 23:49:23 zulu1842 sshd[17404]: Failed password for invalid user ftpuser from 52.236.161.207 port 54758 ssh2 Apr 8 23:49:23 zulu1842 sshd[17404]: Received disconnect from 52.236.161.207: 11: Bye Bye [preauth] Apr 8 23:52:55 zulu1842 sshd[17574]: Invalid user admin from 52.236.161.207 Apr 8 23:52:55 zulu1842 sshd[175........ ------------------------------- |
2020-04-09 06:42:56 |
| 92.118.37.95 | attackspambots | Apr 9 00:15:44 [host] kernel: [3013437.902262] [U Apr 9 00:18:30 [host] kernel: [3013603.180684] [U Apr 9 00:21:23 [host] kernel: [3013776.112348] [U Apr 9 00:22:10 [host] kernel: [3013823.852736] [U Apr 9 00:25:46 [host] kernel: [3014039.040675] [U Apr 9 00:31:48 [host] kernel: [3014401.552227] [U |
2020-04-09 06:58:16 |