City: St. Catharines
Region: Ontario
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: Brock University
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.57.102.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28070
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;139.57.102.53. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019083102 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Sep 01 02:09:28 CST 2019
;; MSG SIZE rcvd: 117
53.102.57.139.in-addr.arpa domain name pointer gote.math.brocku.ca.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
53.102.57.139.in-addr.arpa name = gote.math.brocku.ca.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
188.254.0.160 | attackspambots | 2020-08-07T08:55:21.399494amanda2.illicoweb.com sshd\[37270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.160 user=root 2020-08-07T08:55:23.389012amanda2.illicoweb.com sshd\[37270\]: Failed password for root from 188.254.0.160 port 40506 ssh2 2020-08-07T09:01:33.385202amanda2.illicoweb.com sshd\[38278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.160 user=root 2020-08-07T09:01:35.444042amanda2.illicoweb.com sshd\[38278\]: Failed password for root from 188.254.0.160 port 49374 ssh2 2020-08-07T09:03:14.308272amanda2.illicoweb.com sshd\[38609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.160 user=root ... |
2020-08-07 18:04:46 |
91.134.242.199 | attackbots | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-08-07 18:00:05 |
92.50.249.92 | attackbots | SSH Brute Force |
2020-08-07 18:15:21 |
60.174.248.244 | attackspambots | Aug 7 05:50:20 host sshd[10382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.174.248.244 user=root Aug 7 05:50:22 host sshd[10382]: Failed password for root from 60.174.248.244 port 56741 ssh2 ... |
2020-08-07 18:17:05 |
49.232.189.65 | attackbots | 2020-08-07T10:50:54.942441hostname sshd[50301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.189.65 user=root 2020-08-07T10:50:56.627313hostname sshd[50301]: Failed password for root from 49.232.189.65 port 50696 ssh2 ... |
2020-08-07 17:58:07 |
180.27.180.11 | attackspam | 20/8/6@23:51:17: FAIL: Alarm-Network address from=180.27.180.11 20/8/6@23:51:17: FAIL: Alarm-Network address from=180.27.180.11 ... |
2020-08-07 17:41:52 |
173.208.157.186 | attackbotsspam | 20 attempts against mh-misbehave-ban on comet |
2020-08-07 18:06:43 |
206.189.25.14 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-08-07 18:03:19 |
195.68.98.200 | attackbots | k+ssh-bruteforce |
2020-08-07 18:05:12 |
202.133.56.235 | attackbotsspam | Aug 6 21:42:24 hpm sshd\[29615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.133.56.235 user=root Aug 6 21:42:26 hpm sshd\[29615\]: Failed password for root from 202.133.56.235 port 30980 ssh2 Aug 6 21:46:51 hpm sshd\[29862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.133.56.235 user=root Aug 6 21:46:53 hpm sshd\[29862\]: Failed password for root from 202.133.56.235 port 48314 ssh2 Aug 6 21:51:29 hpm sshd\[30136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.133.56.235 user=root |
2020-08-07 17:45:43 |
106.53.108.16 | attack | Aug 7 11:00:14 pornomens sshd\[5554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.108.16 user=root Aug 7 11:00:16 pornomens sshd\[5554\]: Failed password for root from 106.53.108.16 port 51276 ssh2 Aug 7 11:02:42 pornomens sshd\[5567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.108.16 user=root ... |
2020-08-07 17:37:42 |
121.78.144.139 | attackbotsspam | Automatic report generated by Wazuh |
2020-08-07 18:14:41 |
118.25.49.56 | attack | Aug 7 08:15:05 ns381471 sshd[25332]: Failed password for root from 118.25.49.56 port 46166 ssh2 |
2020-08-07 18:09:01 |
139.59.211.245 | attackspambots | 2020-08-07T10:03:58.064127+02:00 |
2020-08-07 17:57:03 |
192.155.87.185 | attackspam | Unauthorized connection attempt from IP address 192.155.87.185 on port 587 |
2020-08-07 17:59:42 |