City: unknown
Region: unknown
Country: Egypt
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.185.51.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;154.185.51.147. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 11:04:26 CST 2025
;; MSG SIZE rcvd: 107
147.51.185.154.in-addr.arpa domain name pointer host-154.185.147.51-static.tedata.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
147.51.185.154.in-addr.arpa name = host-154.185.147.51-static.tedata.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 193.204.163.219 | attack | May 31 04:11:45 pl3server sshd[17437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.204.163.219 user=r.r May 31 04:11:48 pl3server sshd[17437]: Failed password for r.r from 193.204.163.219 port 35466 ssh2 May 31 04:11:48 pl3server sshd[17437]: Received disconnect from 193.204.163.219 port 35466:11: Bye Bye [preauth] May 31 04:11:48 pl3server sshd[17437]: Disconnected from 193.204.163.219 port 35466 [preauth] May 31 04:23:47 pl3server sshd[9127]: Invalid user guest from 193.204.163.219 port 50274 May 31 04:23:47 pl3server sshd[9127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.204.163.219 May 31 04:23:49 pl3server sshd[9127]: Failed password for invalid user guest from 193.204.163.219 port 50274 ssh2 May 31 04:23:49 pl3server sshd[9127]: Received disconnect from 193.204.163.219 port 50274:11: Bye Bye [preauth] May 31 04:23:49 pl3server sshd[9127]: Disconnected from 193.204.163........ ------------------------------- |
2020-06-01 06:26:21 |
| 188.166.164.10 | attackspam | May 31 17:22:04 firewall sshd[13695]: Failed password for root from 188.166.164.10 port 42320 ssh2 May 31 17:25:10 firewall sshd[13813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.164.10 user=root May 31 17:25:11 firewall sshd[13813]: Failed password for root from 188.166.164.10 port 45828 ssh2 ... |
2020-06-01 06:09:36 |
| 111.229.129.100 | attackspambots | Jun 1 00:15:27 sso sshd[11573]: Failed password for root from 111.229.129.100 port 41472 ssh2 ... |
2020-06-01 06:28:29 |
| 167.99.155.36 | attack | May 31 22:40:50 vps687878 sshd\[12808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.155.36 user=root May 31 22:40:53 vps687878 sshd\[12808\]: Failed password for root from 167.99.155.36 port 43676 ssh2 May 31 22:44:16 vps687878 sshd\[12997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.155.36 user=root May 31 22:44:18 vps687878 sshd\[12997\]: Failed password for root from 167.99.155.36 port 48000 ssh2 May 31 22:47:45 vps687878 sshd\[13430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.155.36 user=root ... |
2020-06-01 06:03:51 |
| 192.144.219.201 | attack | SSH brute-force attempt |
2020-06-01 06:21:10 |
| 82.65.96.207 | attack | May 31 23:30:19 server sshd[8185]: Failed password for root from 82.65.96.207 port 58958 ssh2 May 31 23:32:58 server sshd[10633]: Failed password for root from 82.65.96.207 port 49858 ssh2 May 31 23:35:31 server sshd[13063]: Failed password for root from 82.65.96.207 port 40752 ssh2 |
2020-06-01 06:07:06 |
| 164.138.23.149 | attackbotsspam | May 31 23:42:41 abendstille sshd\[12409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.23.149 user=root May 31 23:42:43 abendstille sshd\[12409\]: Failed password for root from 164.138.23.149 port 51538 ssh2 May 31 23:45:30 abendstille sshd\[15281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.23.149 user=root May 31 23:45:32 abendstille sshd\[15281\]: Failed password for root from 164.138.23.149 port 44071 ssh2 May 31 23:48:14 abendstille sshd\[18098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.138.23.149 user=root ... |
2020-06-01 05:56:27 |
| 124.251.110.148 | attack | Jun 1 00:43:09 journals sshd\[67834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.110.148 user=root Jun 1 00:43:11 journals sshd\[67834\]: Failed password for root from 124.251.110.148 port 49294 ssh2 Jun 1 00:44:30 journals sshd\[67915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.110.148 user=root Jun 1 00:44:33 journals sshd\[67915\]: Failed password for root from 124.251.110.148 port 32902 ssh2 Jun 1 00:45:46 journals sshd\[68026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.110.148 user=root ... |
2020-06-01 05:59:20 |
| 121.145.78.129 | attack | May 31 22:50:35 vps687878 sshd\[13750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.145.78.129 user=root May 31 22:50:37 vps687878 sshd\[13750\]: Failed password for root from 121.145.78.129 port 56824 ssh2 May 31 22:53:53 vps687878 sshd\[13964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.145.78.129 user=root May 31 22:53:55 vps687878 sshd\[13964\]: Failed password for root from 121.145.78.129 port 34066 ssh2 May 31 22:57:07 vps687878 sshd\[14344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.145.78.129 user=root ... |
2020-06-01 06:09:24 |
| 190.151.50.214 | attackbotsspam | port scan and connect, tcp 1433 (ms-sql-s) |
2020-06-01 05:55:02 |
| 193.106.29.75 | attackspambots | 05/31/2020-16:25:13.852605 193.106.29.75 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-06-01 06:08:54 |
| 177.126.24.14 | attackspambots | May 31 06:10:03 vps34202 sshd[28324]: reveeclipse mapping checking getaddrinfo for 14.24.126.177.3dtelecomunicacoes.com.br [177.126.24.14] failed - POSSIBLE BREAK-IN ATTEMPT! May 31 06:10:03 vps34202 sshd[28324]: Invalid user windows from 177.126.24.14 May 31 06:10:03 vps34202 sshd[28324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.126.24.14 May 31 06:10:04 vps34202 sshd[28324]: Failed password for invalid user windows from 177.126.24.14 port 43957 ssh2 May 31 06:10:05 vps34202 sshd[28324]: Received disconnect from 177.126.24.14: 11: Bye Bye [preauth] May 31 06:13:10 vps34202 sshd[28407]: reveeclipse mapping checking getaddrinfo for 14.24.126.177.3dtelecomunicacoes.com.br [177.126.24.14] failed - POSSIBLE BREAK-IN ATTEMPT! May 31 06:13:10 vps34202 sshd[28407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.126.24.14 user=r.r May 31 06:13:12 vps34202 sshd[28407]: Failed passwo........ ------------------------------- |
2020-06-01 06:31:40 |
| 222.186.175.215 | attackspam | 2020-05-31T23:51:59.724047ns386461 sshd\[6696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215 user=root 2020-05-31T23:52:01.608345ns386461 sshd\[6696\]: Failed password for root from 222.186.175.215 port 13314 ssh2 2020-05-31T23:52:05.158537ns386461 sshd\[6696\]: Failed password for root from 222.186.175.215 port 13314 ssh2 2020-05-31T23:52:07.925355ns386461 sshd\[6696\]: Failed password for root from 222.186.175.215 port 13314 ssh2 2020-05-31T23:52:11.770504ns386461 sshd\[6696\]: Failed password for root from 222.186.175.215 port 13314 ssh2 ... |
2020-06-01 05:57:39 |
| 14.63.167.192 | attackspambots | May 31 00:40:45 : SSH login attempts with invalid user |
2020-06-01 06:16:27 |
| 157.245.36.189 | attack | May 31 17:47:51 NPSTNNYC01T sshd[3698]: Failed password for root from 157.245.36.189 port 51510 ssh2 May 31 17:51:14 NPSTNNYC01T sshd[4033]: Failed password for root from 157.245.36.189 port 56086 ssh2 ... |
2020-06-01 05:54:27 |