City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.99.92.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;166.99.92.105. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 00:37:03 CST 2025
;; MSG SIZE rcvd: 106
Host 105.92.99.166.in-addr.arpa not found: 2(SERVFAIL)
server can't find 166.99.92.105.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
122.199.24.189 | attackbotsspam | ssh failed login |
2019-10-25 01:16:54 |
210.120.63.89 | attackbots | Invalid user nagios from 210.120.63.89 port 52942 |
2019-10-25 00:57:12 |
78.212.88.184 | attack | 19/10/24@12:09:07: FAIL: IoT-SSH address from=78.212.88.184 ... |
2019-10-25 00:41:25 |
142.93.39.29 | attackbots | Oct 24 16:23:57 arianus sshd\[9380\]: Unable to negotiate with 142.93.39.29 port 42172: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 \[preauth\] ... |
2019-10-25 01:12:46 |
87.66.207.225 | attack | Invalid user adriaan from 87.66.207.225 port 35540 |
2019-10-25 00:39:24 |
34.92.145.16 | attack | Invalid user smtpuser from 34.92.145.16 port 50514 |
2019-10-25 00:51:06 |
37.59.43.216 | attack | Invalid user test from 37.59.43.216 port 44980 |
2019-10-25 00:50:18 |
217.32.246.90 | attackspam | Invalid user backlog from 217.32.246.90 port 49590 |
2019-10-25 00:55:27 |
149.202.65.173 | attack | frenzy |
2019-10-25 01:12:23 |
34.97.216.211 | attackbots | Invalid user test from 34.97.216.211 port 45008 |
2019-10-25 00:50:43 |
122.4.241.6 | attack | 2019-10-24T12:31:24.2100801495-001 sshd\[11245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.4.241.6 user=root 2019-10-24T12:31:25.7876351495-001 sshd\[11245\]: Failed password for root from 122.4.241.6 port 16182 ssh2 2019-10-24T12:39:51.1003371495-001 sshd\[12006\]: Invalid user com from 122.4.241.6 port 65414 2019-10-24T12:39:51.1075231495-001 sshd\[12006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.4.241.6 2019-10-24T12:39:53.2874301495-001 sshd\[12006\]: Failed password for invalid user com from 122.4.241.6 port 65414 ssh2 2019-10-24T12:43:39.7766221495-001 sshd\[12235\]: Invalid user 12 from 122.4.241.6 port 55828 2019-10-24T12:43:39.7853001495-001 sshd\[12235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.4.241.6 ... |
2019-10-25 01:18:19 |
41.234.71.207 | attackbotsspam | Invalid user admin from 41.234.71.207 port 54521 |
2019-10-25 00:49:37 |
198.50.197.216 | attackbots | Invalid user oracle from 198.50.197.216 port 60906 |
2019-10-25 01:00:52 |
178.128.183.90 | attack | Invalid user technicom from 178.128.183.90 port 55998 |
2019-10-25 01:06:04 |
94.177.213.167 | attackbotsspam | Invalid user test7 from 94.177.213.167 port 55722 |
2019-10-25 00:38:10 |