City: unknown
Region: unknown
Country: Viet Nam
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.160.92.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.160.92.125. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 15:18:43 CST 2025
;; MSG SIZE rcvd: 106
125.92.160.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
125.92.160.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 37.59.37.69 | attack | Jun 12 05:56:15 legacy sshd[25489]: Failed password for root from 37.59.37.69 port 50113 ssh2 Jun 12 05:59:08 legacy sshd[25599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.37.69 Jun 12 05:59:10 legacy sshd[25599]: Failed password for invalid user vopni from 37.59.37.69 port 37744 ssh2 ... |
2020-06-12 12:14:22 |
| 106.12.178.246 | attackspambots | Jun 12 05:57:30 piServer sshd[12139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.178.246 Jun 12 05:57:32 piServer sshd[12139]: Failed password for invalid user kay from 106.12.178.246 port 52828 ssh2 Jun 12 05:58:57 piServer sshd[12234]: Failed password for root from 106.12.178.246 port 40248 ssh2 ... |
2020-06-12 12:24:18 |
| 149.56.99.85 | attackbots | 2020-06-12T03:59:07.819587homeassistant sshd[30337]: Invalid user letsencrypt from 149.56.99.85 port 57314 2020-06-12T03:59:07.834549homeassistant sshd[30337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.99.85 ... |
2020-06-12 12:16:29 |
| 193.228.91.109 | attack | Jun 12 05:58:44 minden010 sshd[6652]: Failed password for root from 193.228.91.109 port 35052 ssh2 Jun 12 05:59:06 minden010 sshd[6690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.228.91.109 Jun 12 05:59:08 minden010 sshd[6690]: Failed password for invalid user oracle from 193.228.91.109 port 58096 ssh2 ... |
2020-06-12 12:06:35 |
| 106.52.115.154 | attack | Jun 11 22:51:56 game-panel sshd[22490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.115.154 Jun 11 22:51:58 game-panel sshd[22490]: Failed password for invalid user alexie from 106.52.115.154 port 57114 ssh2 Jun 11 22:55:04 game-panel sshd[22577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.115.154 |
2020-06-12 08:55:34 |
| 142.93.6.190 | attack | Jun 11 18:40:25 Tower sshd[25645]: Connection from 142.93.6.190 port 37938 on 192.168.10.220 port 22 rdomain "" Jun 11 18:40:28 Tower sshd[25645]: Invalid user alessandro from 142.93.6.190 port 37938 Jun 11 18:40:28 Tower sshd[25645]: error: Could not get shadow information for NOUSER Jun 11 18:40:28 Tower sshd[25645]: Failed password for invalid user alessandro from 142.93.6.190 port 37938 ssh2 Jun 11 18:40:28 Tower sshd[25645]: Received disconnect from 142.93.6.190 port 37938:11: Bye Bye [preauth] Jun 11 18:40:28 Tower sshd[25645]: Disconnected from invalid user alessandro 142.93.6.190 port 37938 [preauth] |
2020-06-12 09:05:40 |
| 188.166.208.131 | attackbots | Jun 12 04:02:08 django-0 sshd\[25775\]: Invalid user clerk from 188.166.208.131Jun 12 04:02:10 django-0 sshd\[25775\]: Failed password for invalid user clerk from 188.166.208.131 port 57458 ssh2Jun 12 04:05:48 django-0 sshd\[25892\]: Invalid user admin from 188.166.208.131 ... |
2020-06-12 12:19:16 |
| 60.219.187.128 | attack | (ftpd) Failed FTP login from 60.219.187.128 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jun 12 08:29:12 ir1 pure-ftpd: (?@60.219.187.128) [WARNING] Authentication failed for user [anonymous] |
2020-06-12 12:05:36 |
| 87.251.74.50 | attack | 2020-06-12T00:52:15.516042homeassistant sshd[25787]: Invalid user user from 87.251.74.50 port 32032 2020-06-12T00:52:15.557258homeassistant sshd[25786]: Invalid user admin from 87.251.74.50 port 31618 2020-06-12T00:52:15.825444homeassistant sshd[25787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.251.74.50 ... |
2020-06-12 09:03:05 |
| 137.74.198.126 | attack | Jun 12 04:58:57 cdc sshd[1958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.198.126 Jun 12 04:58:59 cdc sshd[1958]: Failed password for invalid user site from 137.74.198.126 port 47072 ssh2 |
2020-06-12 12:23:31 |
| 222.186.30.76 | attack | Jun 12 02:44:51 vmi345603 sshd[14616]: Failed password for root from 222.186.30.76 port 21937 ssh2 Jun 12 02:44:54 vmi345603 sshd[14616]: Failed password for root from 222.186.30.76 port 21937 ssh2 ... |
2020-06-12 08:50:55 |
| 68.183.22.85 | attackspambots | (sshd) Failed SSH login from 68.183.22.85 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 12 06:44:40 s1 sshd[7547]: Invalid user admin from 68.183.22.85 port 53694 Jun 12 06:44:42 s1 sshd[7547]: Failed password for invalid user admin from 68.183.22.85 port 53694 ssh2 Jun 12 06:57:34 s1 sshd[7844]: Invalid user ts3musicbot from 68.183.22.85 port 49018 Jun 12 06:57:36 s1 sshd[7844]: Failed password for invalid user ts3musicbot from 68.183.22.85 port 49018 ssh2 Jun 12 07:00:46 s1 sshd[7982]: Invalid user kruspe from 68.183.22.85 port 52678 |
2020-06-12 12:03:19 |
| 122.51.188.20 | attackbots | Jun 12 05:58:24 vps647732 sshd[10336]: Failed password for root from 122.51.188.20 port 37634 ssh2 ... |
2020-06-12 12:20:23 |
| 202.171.79.206 | attack | Jun 12 05:45:19 server sshd[17586]: Failed password for root from 202.171.79.206 port 60304 ssh2 Jun 12 05:52:20 server sshd[24386]: Failed password for root from 202.171.79.206 port 54612 ssh2 Jun 12 05:59:14 server sshd[31017]: Failed password for root from 202.171.79.206 port 48818 ssh2 |
2020-06-12 12:08:48 |
| 144.217.77.179 | attackbots | 2020-06-12T03:59:02.084452homeassistant sshd[30335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.77.179 user=root 2020-06-12T03:59:03.711522homeassistant sshd[30335]: Failed password for root from 144.217.77.179 port 51150 ssh2 ... |
2020-06-12 12:19:51 |