City: Kaohsiung
Region: Kaohsiung
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.16.253.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61604
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;163.16.253.64. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:03:51 CST 2025
;; MSG SIZE rcvd: 106
Host 64.253.16.163.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 64.253.16.163.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
132.205.229.177 | attackbotsspam | 132.205.229.177 - - [03/Sep/2019:20:38:45 +0200] "GET /index.php HTTP/1.1" 302 570 ... |
2019-09-04 05:14:47 |
218.98.26.172 | attackbots | 2019-09-03T20:55:58.080168abusebot-7.cloudsearch.cf sshd\[29157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.172 user=root |
2019-09-04 04:58:51 |
89.234.157.254 | attack | Sep 3 22:51:27 rotator sshd\[23161\]: Failed password for root from 89.234.157.254 port 33809 ssh2Sep 3 22:51:29 rotator sshd\[23161\]: Failed password for root from 89.234.157.254 port 33809 ssh2Sep 3 22:51:32 rotator sshd\[23161\]: Failed password for root from 89.234.157.254 port 33809 ssh2Sep 3 22:51:35 rotator sshd\[23161\]: Failed password for root from 89.234.157.254 port 33809 ssh2Sep 3 22:51:37 rotator sshd\[23161\]: Failed password for root from 89.234.157.254 port 33809 ssh2Sep 3 22:51:39 rotator sshd\[23161\]: Failed password for root from 89.234.157.254 port 33809 ssh2 ... |
2019-09-04 04:55:26 |
159.192.98.3 | attack | 2019-09-03T21:50:37.236783 sshd[29861]: Invalid user ht from 159.192.98.3 port 45660 2019-09-03T21:50:37.250109 sshd[29861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.98.3 2019-09-03T21:50:37.236783 sshd[29861]: Invalid user ht from 159.192.98.3 port 45660 2019-09-03T21:50:39.793076 sshd[29861]: Failed password for invalid user ht from 159.192.98.3 port 45660 ssh2 2019-09-03T22:03:50.568169 sshd[30075]: Invalid user internet from 159.192.98.3 port 49508 ... |
2019-09-04 04:39:42 |
191.240.172.7 | attackbotsspam | 23/tcp [2019-09-03]1pkt |
2019-09-04 04:29:26 |
128.199.202.206 | attackbotsspam | Sep 3 23:23:47 yabzik sshd[3907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.202.206 Sep 3 23:23:49 yabzik sshd[3907]: Failed password for invalid user cyborg123 from 128.199.202.206 port 58294 ssh2 Sep 3 23:28:43 yabzik sshd[5812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.202.206 |
2019-09-04 04:40:21 |
14.2.190.194 | attackspam | Sep 3 10:53:36 friendsofhawaii sshd\[8038\]: Invalid user zch from 14.2.190.194 Sep 3 10:53:36 friendsofhawaii sshd\[8038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.2.190.194 Sep 3 10:53:38 friendsofhawaii sshd\[8038\]: Failed password for invalid user zch from 14.2.190.194 port 58838 ssh2 Sep 3 10:59:42 friendsofhawaii sshd\[8591\]: Invalid user ut2k4server from 14.2.190.194 Sep 3 10:59:42 friendsofhawaii sshd\[8591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.2.190.194 |
2019-09-04 05:10:11 |
173.208.152.250 | attackbots | Unauthorised access (Sep 3) SRC=173.208.152.250 LEN=40 TTL=241 ID=2990 TCP DPT=445 WINDOW=1024 SYN |
2019-09-04 05:03:05 |
43.224.249.224 | attackspam | Sep 3 10:32:38 auw2 sshd\[3703\]: Invalid user onie from 43.224.249.224 Sep 3 10:32:39 auw2 sshd\[3703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.224.249.224 Sep 3 10:32:40 auw2 sshd\[3703\]: Failed password for invalid user onie from 43.224.249.224 port 43841 ssh2 Sep 3 10:37:40 auw2 sshd\[4184\]: Invalid user avis from 43.224.249.224 Sep 3 10:37:40 auw2 sshd\[4184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.224.249.224 |
2019-09-04 04:39:11 |
104.248.159.129 | attack | Sep 3 20:42:10 MK-Soft-VM7 sshd\[26876\]: Invalid user mama from 104.248.159.129 port 60278 Sep 3 20:42:10 MK-Soft-VM7 sshd\[26876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.159.129 Sep 3 20:42:12 MK-Soft-VM7 sshd\[26876\]: Failed password for invalid user mama from 104.248.159.129 port 60278 ssh2 ... |
2019-09-04 05:01:51 |
103.76.252.6 | attackbotsspam | 2019-09-03T19:56:59.171164hub.schaetter.us sshd\[2069\]: Invalid user sysadmin from 103.76.252.6 2019-09-03T19:56:59.206296hub.schaetter.us sshd\[2069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6 2019-09-03T19:57:00.855288hub.schaetter.us sshd\[2069\]: Failed password for invalid user sysadmin from 103.76.252.6 port 9858 ssh2 2019-09-03T20:01:21.092407hub.schaetter.us sshd\[2110\]: Invalid user appldisc from 103.76.252.6 2019-09-03T20:01:21.151224hub.schaetter.us sshd\[2110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6 ... |
2019-09-04 04:57:26 |
128.199.203.236 | attack | Sep 3 22:41:43 dev0-dcfr-rnet sshd[26649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.203.236 Sep 3 22:41:45 dev0-dcfr-rnet sshd[26649]: Failed password for invalid user test from 128.199.203.236 port 47576 ssh2 Sep 3 22:51:36 dev0-dcfr-rnet sshd[26784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.203.236 |
2019-09-04 05:15:03 |
187.237.130.98 | attackspam | Aug 28 22:53:16 Server10 sshd[15158]: User root from 187.237.130.98 not allowed because not listed in AllowUsers Aug 28 22:53:19 Server10 sshd[15158]: Failed password for invalid user root from 187.237.130.98 port 58310 ssh2 Aug 28 22:57:30 Server10 sshd[22887]: User admin from 187.237.130.98 not allowed because not listed in AllowUsers |
2019-09-04 04:24:07 |
59.124.104.157 | attackbotsspam | 2019-09-03T20:12:03.644637abusebot-8.cloudsearch.cf sshd\[14045\]: Invalid user hans from 59.124.104.157 port 55632 |
2019-09-04 04:34:50 |
209.141.51.150 | attackspam | Sep 3 20:11:00 thevastnessof sshd[3318]: Failed password for root from 209.141.51.150 port 45063 ssh2 ... |
2019-09-04 04:35:59 |