City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.91.102.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;168.91.102.172. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:04:17 CST 2025
;; MSG SIZE rcvd: 107
Host 172.102.91.168.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 172.102.91.168.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
111.229.79.169 | attackspambots | (sshd) Failed SSH login from 111.229.79.169 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 9 12:51:58 server5 sshd[2123]: Invalid user sage from 111.229.79.169 Sep 9 12:51:58 server5 sshd[2123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.79.169 Sep 9 12:52:00 server5 sshd[2123]: Failed password for invalid user sage from 111.229.79.169 port 45478 ssh2 Sep 9 12:55:05 server5 sshd[3610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.79.169 user=root Sep 9 12:55:06 server5 sshd[3610]: Failed password for root from 111.229.79.169 port 47108 ssh2 |
2020-09-10 05:15:28 |
94.102.54.199 | attackbotsspam | 09.09.2020 23:18:22 - Login Fail on hMailserver Detected by ELinOX-hMail-A2F |
2020-09-10 05:26:52 |
5.135.186.52 | attackspam | Sep 9 19:08:02 melroy-server sshd[27271]: Failed password for root from 5.135.186.52 port 34128 ssh2 ... |
2020-09-10 05:20:52 |
111.230.210.229 | attackbots | Sep 10 02:30:54 itv-usvr-01 sshd[8039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.210.229 user=root Sep 10 02:30:56 itv-usvr-01 sshd[8039]: Failed password for root from 111.230.210.229 port 43760 ssh2 Sep 10 02:34:38 itv-usvr-01 sshd[8195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.210.229 user=root Sep 10 02:34:40 itv-usvr-01 sshd[8195]: Failed password for root from 111.230.210.229 port 53690 ssh2 Sep 10 02:38:04 itv-usvr-01 sshd[8352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.210.229 user=root Sep 10 02:38:06 itv-usvr-01 sshd[8352]: Failed password for root from 111.230.210.229 port 35374 ssh2 |
2020-09-10 05:04:57 |
222.186.175.154 | attack | Sep 10 07:13:52 localhost sshd[3962779]: Unable to negotiate with 222.186.175.154 port 47870: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... |
2020-09-10 05:20:09 |
107.170.131.23 | attack | Sep 9 19:01:29 vps333114 sshd[19926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.131.23 user=root Sep 9 19:01:31 vps333114 sshd[19926]: Failed password for root from 107.170.131.23 port 49610 ssh2 ... |
2020-09-10 05:02:31 |
134.175.55.10 | attackbots | (sshd) Failed SSH login from 134.175.55.10 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 9 16:05:40 server5 sshd[30350]: Invalid user zennia from 134.175.55.10 Sep 9 16:05:40 server5 sshd[30350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.55.10 Sep 9 16:05:42 server5 sshd[30350]: Failed password for invalid user zennia from 134.175.55.10 port 57266 ssh2 Sep 9 16:16:19 server5 sshd[3436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.55.10 user=root Sep 9 16:16:21 server5 sshd[3436]: Failed password for root from 134.175.55.10 port 36822 ssh2 |
2020-09-10 05:08:11 |
45.82.137.35 | attack | Sep 9 20:57:06 MainVPS sshd[7695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.82.137.35 user=root Sep 9 20:57:08 MainVPS sshd[7695]: Failed password for root from 45.82.137.35 port 35584 ssh2 Sep 9 21:01:11 MainVPS sshd[472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.82.137.35 user=root Sep 9 21:01:13 MainVPS sshd[472]: Failed password for root from 45.82.137.35 port 41320 ssh2 Sep 9 21:05:22 MainVPS sshd[30448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.82.137.35 user=root Sep 9 21:05:24 MainVPS sshd[30448]: Failed password for root from 45.82.137.35 port 47056 ssh2 ... |
2020-09-10 05:12:44 |
42.113.144.86 | attackbotsspam | 20/9/9@12:54:31: FAIL: Alarm-Network address from=42.113.144.86 20/9/9@12:54:31: FAIL: Alarm-Network address from=42.113.144.86 ... |
2020-09-10 05:34:52 |
92.154.89.19 | attack | Dovecot Invalid User Login Attempt. |
2020-09-10 05:33:50 |
190.145.224.18 | attackbots | 2020-09-09T13:26:38.421516suse-nuc sshd[26219]: User root from 190.145.224.18 not allowed because listed in DenyUsers ... |
2020-09-10 05:29:33 |
164.68.111.62 | attack | Auto reported by IDS |
2020-09-10 05:03:29 |
61.177.172.54 | attack | Sep 9 23:21:32 plg sshd[3760]: Failed none for invalid user root from 61.177.172.54 port 61431 ssh2 Sep 9 23:21:32 plg sshd[3760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.54 user=root Sep 9 23:21:34 plg sshd[3760]: Failed password for invalid user root from 61.177.172.54 port 61431 ssh2 Sep 9 23:21:38 plg sshd[3760]: Failed password for invalid user root from 61.177.172.54 port 61431 ssh2 Sep 9 23:21:42 plg sshd[3760]: Failed password for invalid user root from 61.177.172.54 port 61431 ssh2 Sep 9 23:21:46 plg sshd[3760]: Failed password for invalid user root from 61.177.172.54 port 61431 ssh2 Sep 9 23:21:50 plg sshd[3760]: Failed password for invalid user root from 61.177.172.54 port 61431 ssh2 Sep 9 23:21:50 plg sshd[3760]: error: maximum authentication attempts exceeded for invalid user root from 61.177.172.54 port 61431 ssh2 [preauth] ... |
2020-09-10 05:24:42 |
175.6.32.230 | attackspam | 2020-09-09 15:48:43.014803-0500 localhost screensharingd[18056]: Authentication: FAILED :: User Name: N/A :: Viewer Address: 175.6.32.230 :: Type: VNC DES |
2020-09-10 05:17:34 |
82.196.9.161 | attackspambots | *Port Scan* detected from 82.196.9.161 (NL/Netherlands/North Holland/Amsterdam-Zuidoost/-). 4 hits in the last 240 seconds |
2020-09-10 05:02:01 |