City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.150.20.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39972
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;166.150.20.97. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 12:35:26 CST 2025
;; MSG SIZE rcvd: 106
97.20.150.166.in-addr.arpa domain name pointer 97.sub-166-150-20.myvzw.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
97.20.150.166.in-addr.arpa name = 97.sub-166-150-20.myvzw.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 36.26.68.41 | attackbots | Aug 11 23:39:27 server sshd[6527]: Failed password for root from 36.26.68.41 port 47976 ssh2 Aug 11 23:45:21 server sshd[9038]: Failed password for root from 36.26.68.41 port 53626 ssh2 Aug 11 23:51:22 server sshd[11636]: Failed password for root from 36.26.68.41 port 59276 ssh2 |
2020-08-12 06:03:11 |
| 87.245.179.81 | attack | 20/8/11@16:35:59: FAIL: Alarm-Network address from=87.245.179.81 20/8/11@16:35:59: FAIL: Alarm-Network address from=87.245.179.81 ... |
2020-08-12 06:18:30 |
| 88.119.171.232 | attack | Mail account phishing scam |
2020-08-12 06:14:04 |
| 140.143.228.18 | attackbots | Triggered by Fail2Ban at Ares web server |
2020-08-12 05:57:34 |
| 61.177.172.177 | attackbotsspam | Aug 12 00:06:27 jane sshd[17060]: Failed password for root from 61.177.172.177 port 60540 ssh2 Aug 12 00:06:32 jane sshd[17060]: Failed password for root from 61.177.172.177 port 60540 ssh2 ... |
2020-08-12 06:15:43 |
| 203.151.214.33 | attackbotsspam | 2020-08-11T22:35:38.472233www postfix/smtpd[16272]: warning: 33.214.151.203.sta.inet.co.th[203.151.214.33]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-08-11T22:35:47.171859www postfix/smtpd[16272]: warning: 33.214.151.203.sta.inet.co.th[203.151.214.33]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2020-08-11T22:36:00.330133www postfix/smtpd[16272]: warning: 33.214.151.203.sta.inet.co.th[203.151.214.33]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-08-12 06:17:32 |
| 61.247.178.170 | attackbots | Aug 11 22:36:04 cosmoit sshd[26026]: Failed password for root from 61.247.178.170 port 48928 ssh2 |
2020-08-12 06:15:08 |
| 218.144.252.85 | attackbots | Bruteforce detected by fail2ban |
2020-08-12 06:06:53 |
| 51.255.35.58 | attackspam | frenzy |
2020-08-12 06:05:52 |
| 193.243.165.142 | attackspambots | Aug 11 23:00:09 cp sshd[10564]: Failed password for root from 193.243.165.142 port 55022 ssh2 Aug 11 23:00:09 cp sshd[10564]: Failed password for root from 193.243.165.142 port 55022 ssh2 |
2020-08-12 06:07:53 |
| 217.253.170.104 | attackspambots | Automatic report - Port Scan Attack |
2020-08-12 05:56:48 |
| 45.55.145.31 | attackbots | Aug 12 01:55:15 lunarastro sshd[29849]: Failed password for root from 45.55.145.31 port 38204 ssh2 Aug 12 02:05:41 lunarastro sshd[29978]: Failed password for root from 45.55.145.31 port 56030 ssh2 |
2020-08-12 06:09:33 |
| 61.7.240.185 | attackspam | Aug 11 16:36:25 NPSTNNYC01T sshd[13235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.240.185 Aug 11 16:36:27 NPSTNNYC01T sshd[13235]: Failed password for invalid user tmp from 61.7.240.185 port 47046 ssh2 Aug 11 16:36:37 NPSTNNYC01T sshd[13261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.240.185 ... |
2020-08-12 05:48:47 |
| 129.211.38.207 | attack | Aug 11 22:19:47 Ubuntu-1404-trusty-64-minimal sshd\[3131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.38.207 user=root Aug 11 22:19:50 Ubuntu-1404-trusty-64-minimal sshd\[3131\]: Failed password for root from 129.211.38.207 port 39110 ssh2 Aug 11 22:29:36 Ubuntu-1404-trusty-64-minimal sshd\[8368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.38.207 user=root Aug 11 22:29:38 Ubuntu-1404-trusty-64-minimal sshd\[8368\]: Failed password for root from 129.211.38.207 port 40594 ssh2 Aug 11 22:35:51 Ubuntu-1404-trusty-64-minimal sshd\[14626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.38.207 user=root |
2020-08-12 06:24:46 |
| 222.186.180.223 | attack | Aug 11 23:47:35 vmanager6029 sshd\[25604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223 user=root Aug 11 23:47:37 vmanager6029 sshd\[25602\]: error: PAM: Authentication failure for root from 222.186.180.223 Aug 11 23:47:38 vmanager6029 sshd\[25605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223 user=root |
2020-08-12 05:49:09 |