City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.52.30.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58930
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;157.52.30.129. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 19:00:39 CST 2025
;; MSG SIZE rcvd: 106
129.30.52.157.in-addr.arpa domain name pointer 157-52-30-129.cpe.teksavvy.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
129.30.52.157.in-addr.arpa name = 157-52-30-129.cpe.teksavvy.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 60.2.10.86 | attackspambots | Jun 6 22:31:38 prox sshd[9987]: Failed password for root from 60.2.10.86 port 35859 ssh2 |
2020-06-07 07:40:50 |
| 101.78.209.39 | attackbotsspam | Jun 6 22:30:37 ns382633 sshd\[31873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.209.39 user=root Jun 6 22:30:39 ns382633 sshd\[31873\]: Failed password for root from 101.78.209.39 port 40720 ssh2 Jun 6 22:44:23 ns382633 sshd\[1705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.209.39 user=root Jun 6 22:44:24 ns382633 sshd\[1705\]: Failed password for root from 101.78.209.39 port 32797 ssh2 Jun 6 22:49:35 ns382633 sshd\[2521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.209.39 user=root |
2020-06-07 07:44:49 |
| 138.197.168.116 | attack | Jun 6 17:35:45 ws24vmsma01 sshd[184168]: Failed password for root from 138.197.168.116 port 45946 ssh2 Jun 6 17:43:07 ws24vmsma01 sshd[159966]: Failed password for root from 138.197.168.116 port 39548 ssh2 ... |
2020-06-07 07:36:00 |
| 106.13.72.190 | attackspambots | (sshd) Failed SSH login from 106.13.72.190 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 7 00:02:55 s1 sshd[25328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.190 user=root Jun 7 00:02:57 s1 sshd[25328]: Failed password for root from 106.13.72.190 port 51924 ssh2 Jun 7 00:06:56 s1 sshd[25563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.190 user=root Jun 7 00:06:59 s1 sshd[25563]: Failed password for root from 106.13.72.190 port 48462 ssh2 Jun 7 00:10:49 s1 sshd[25854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.72.190 user=root |
2020-06-07 07:29:16 |
| 212.83.141.237 | attackbotsspam | 5x Failed Password |
2020-06-07 07:49:12 |
| 144.172.79.5 | attackspam | Jun 6 02:09:47 h1637304 sshd[22621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.172.79.5 Jun 6 02:09:50 h1637304 sshd[22621]: Failed password for invalid user honey from 144.172.79.5 port 50584 ssh2 Jun 6 02:09:50 h1637304 sshd[22621]: Received disconnect from 144.172.79.5: 11: PECL/ssh2 (hxxp://pecl.php.net/packages/ssh2) [preauth] Jun 6 02:09:55 h1637304 sshd[22626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.172.79.5 user=r.r Jun 6 02:09:57 h1637304 sshd[22626]: Failed password for r.r from 144.172.79.5 port 58770 ssh2 Jun 6 02:09:57 h1637304 sshd[22626]: Received disconnect from 144.172.79.5: 11: PECL/ssh2 (hxxp://pecl.php.net/packages/ssh2) [preauth] Jun 6 02:10:03 h1637304 sshd[22628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.172.79.5 user=r.r Jun 6 02:10:05 h1637304 sshd[22628]: Failed password for r.r fro........ ------------------------------- |
2020-06-07 07:44:26 |
| 222.186.42.136 | attack | Jun 6 19:44:31 NPSTNNYC01T sshd[11637]: Failed password for root from 222.186.42.136 port 31236 ssh2 Jun 6 19:44:43 NPSTNNYC01T sshd[11669]: Failed password for root from 222.186.42.136 port 43592 ssh2 Jun 6 19:44:45 NPSTNNYC01T sshd[11669]: Failed password for root from 222.186.42.136 port 43592 ssh2 ... |
2020-06-07 07:55:00 |
| 89.248.174.193 | attack | port |
2020-06-07 07:22:08 |
| 150.95.31.150 | attackbots | Jun 7 01:08:26 server sshd[7812]: Failed password for root from 150.95.31.150 port 32972 ssh2 Jun 7 01:11:45 server sshd[8353]: Failed password for root from 150.95.31.150 port 55808 ssh2 ... |
2020-06-07 07:21:37 |
| 177.37.1.10 | attackbotsspam |
|
2020-06-07 07:29:50 |
| 78.128.113.106 | attackspam | Jun 7 01:31:43 *host* postfix/smtps/smtpd\[10231\]: warning: unknown\[78.128.113.106\]: SASL PLAIN authentication failed: |
2020-06-07 07:33:33 |
| 218.164.48.87 | attack | Port probing on unauthorized port 23 |
2020-06-07 07:48:16 |
| 140.143.199.169 | attackbotsspam | Jun 7 00:33:22 prox sshd[9245]: Failed password for root from 140.143.199.169 port 59264 ssh2 |
2020-06-07 07:38:35 |
| 193.70.38.187 | attackbotsspam | prod6 ... |
2020-06-07 07:24:17 |
| 95.167.39.12 | attack | 2020-06-06T17:36:46.7704251495-001 sshd[49258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.39.12 user=root 2020-06-06T17:36:48.6072501495-001 sshd[49258]: Failed password for root from 95.167.39.12 port 41174 ssh2 2020-06-06T17:40:00.6171321495-001 sshd[49427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.39.12 user=root 2020-06-06T17:40:03.0907201495-001 sshd[49427]: Failed password for root from 95.167.39.12 port 42570 ssh2 2020-06-06T17:43:14.4756711495-001 sshd[49573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.39.12 user=root 2020-06-06T17:43:16.2469691495-001 sshd[49573]: Failed password for root from 95.167.39.12 port 43966 ssh2 ... |
2020-06-07 07:56:58 |