City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.135.103.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63229
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;147.135.103.243. IN A
;; AUTHORITY SECTION:
. 147 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:37:32 CST 2022
;; MSG SIZE rcvd: 108
243.103.135.147.in-addr.arpa domain name pointer ultra.ownmyserver.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
243.103.135.147.in-addr.arpa name = ultra.ownmyserver.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
167.114.115.22 | attack | Aug 24 07:42:41 ny01 sshd[1476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.115.22 Aug 24 07:42:43 ny01 sshd[1476]: Failed password for invalid user hw from 167.114.115.22 port 50928 ssh2 Aug 24 07:46:39 ny01 sshd[1845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.115.22 |
2019-08-24 20:00:34 |
174.138.9.132 | attack | firewall-block, port(s): 714/tcp |
2019-08-24 20:16:38 |
134.209.126.154 | attackspambots | Aug 24 07:57:15 vps200512 sshd\[26923\]: Invalid user user01 from 134.209.126.154 Aug 24 07:57:15 vps200512 sshd\[26923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.126.154 Aug 24 07:57:17 vps200512 sshd\[26923\]: Failed password for invalid user user01 from 134.209.126.154 port 46326 ssh2 Aug 24 08:01:09 vps200512 sshd\[27038\]: Invalid user sg from 134.209.126.154 Aug 24 08:01:09 vps200512 sshd\[27038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.126.154 |
2019-08-24 20:11:22 |
68.183.218.185 | attack | DATE:2019-08-24 13:36:41,IP:68.183.218.185,MATCHES:11,PORT:ssh |
2019-08-24 20:55:43 |
78.186.188.192 | attackspam | Unauthorized connection attempt from IP address 78.186.188.192 on Port 445(SMB) |
2019-08-24 20:35:39 |
93.14.78.71 | attackspam | Aug 24 13:51:55 vps647732 sshd[3775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.14.78.71 Aug 24 13:51:57 vps647732 sshd[3775]: Failed password for invalid user adrianna from 93.14.78.71 port 52842 ssh2 ... |
2019-08-24 20:03:22 |
46.101.127.49 | attack | Invalid user sgi from 46.101.127.49 port 43520 |
2019-08-24 20:04:13 |
220.82.185.163 | attackspambots | SSHScan |
2019-08-24 20:37:14 |
159.65.164.133 | attack | Aug 24 12:00:48 ip-172-31-1-72 sshd\[13815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.164.133 user=root Aug 24 12:00:50 ip-172-31-1-72 sshd\[13815\]: Failed password for root from 159.65.164.133 port 40616 ssh2 Aug 24 12:05:22 ip-172-31-1-72 sshd\[13910\]: Invalid user marvin from 159.65.164.133 Aug 24 12:05:22 ip-172-31-1-72 sshd\[13910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.164.133 Aug 24 12:05:25 ip-172-31-1-72 sshd\[13910\]: Failed password for invalid user marvin from 159.65.164.133 port 56812 ssh2 |
2019-08-24 20:14:45 |
116.97.218.212 | attack | Brute force attempt |
2019-08-24 20:38:50 |
200.209.145.246 | attackspam | Aug 24 13:24:15 v22019058497090703 sshd[26049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.209.145.246 Aug 24 13:24:18 v22019058497090703 sshd[26049]: Failed password for invalid user sharon from 200.209.145.246 port 58949 ssh2 Aug 24 13:29:42 v22019058497090703 sshd[26459]: Failed password for root from 200.209.145.246 port 52979 ssh2 ... |
2019-08-24 19:56:08 |
158.181.18.72 | attack | Unauthorized connection attempt from IP address 158.181.18.72 on Port 445(SMB) |
2019-08-24 19:59:29 |
206.189.222.181 | attack | Aug 24 01:57:02 sachi sshd\[30862\]: Invalid user rajev from 206.189.222.181 Aug 24 01:57:02 sachi sshd\[30862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.222.181 Aug 24 01:57:05 sachi sshd\[30862\]: Failed password for invalid user rajev from 206.189.222.181 port 57986 ssh2 Aug 24 02:00:55 sachi sshd\[31267\]: Invalid user horde from 206.189.222.181 Aug 24 02:00:55 sachi sshd\[31267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.222.181 |
2019-08-24 20:13:00 |
51.79.141.242 | attack | Lines containing failures of 51.79.141.242 Aug 24 09:19:09 nxxxxxxx sshd[7676]: Invalid user customercare from 51.79.141.242 port 60490 Aug 24 09:19:09 nxxxxxxx sshd[7676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.141.242 Aug 24 09:19:11 nxxxxxxx sshd[7676]: Failed password for invalid user customercare from 51.79.141.242 port 60490 ssh2 Aug 24 09:19:11 nxxxxxxx sshd[7676]: Received disconnect from 51.79.141.242 port 60490:11: Bye Bye [preauth] Aug 24 09:19:11 nxxxxxxx sshd[7676]: Disconnected from invalid user customercare 51.79.141.242 port 60490 [preauth] Aug 24 09:33:21 nxxxxxxx sshd[9690]: Invalid user user from 51.79.141.242 port 49042 Aug 24 09:33:21 nxxxxxxx sshd[9690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.141.242 Aug 24 09:33:23 nxxxxxxx sshd[9690]: Failed password for invalid user user from 51.79.141.242 port 49042 ssh2 Aug 24 09:33:23 nxxxxxxx sshd[969........ ------------------------------ |
2019-08-24 20:54:58 |
202.107.227.42 | attack | firewall-block, port(s): 8080/tcp |
2019-08-24 19:59:01 |