City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.142.250.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11370
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;169.142.250.55. IN A
;; AUTHORITY SECTION:
. 548 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020010801 1800 900 604800 86400
;; Query time: 118 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 09 09:13:05 CST 2020
;; MSG SIZE rcvd: 118
Host 55.250.142.169.in-addr.arpa not found: 2(SERVFAIL)
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
*** Can't find 55.250.142.169.in-addr.arpa.: No answer
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
106.13.23.141 | attackspam | 2019-12-18T07:49:31.636174abusebot-5.cloudsearch.cf sshd\[24030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.23.141 user=root 2019-12-18T07:49:33.985200abusebot-5.cloudsearch.cf sshd\[24030\]: Failed password for root from 106.13.23.141 port 44408 ssh2 2019-12-18T07:58:04.068190abusebot-5.cloudsearch.cf sshd\[24141\]: Invalid user temp from 106.13.23.141 port 43092 2019-12-18T07:58:04.073381abusebot-5.cloudsearch.cf sshd\[24141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.23.141 |
2019-12-18 16:15:11 |
51.75.32.141 | attackbots | Dec 18 09:09:24 vps647732 sshd[7336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.32.141 Dec 18 09:09:26 vps647732 sshd[7336]: Failed password for invalid user zybala from 51.75.32.141 port 39880 ssh2 ... |
2019-12-18 16:25:33 |
150.165.67.34 | attack | --- report --- Dec 18 04:56:39 sshd: Connection from 150.165.67.34 port 47892 Dec 18 04:56:39 sshd: Invalid user martinengo from 150.165.67.34 Dec 18 04:56:42 sshd: Failed password for invalid user martinengo from 150.165.67.34 port 47892 ssh2 Dec 18 04:56:42 sshd: Received disconnect from 150.165.67.34: 11: Bye Bye [preauth] |
2019-12-18 16:11:36 |
145.239.78.59 | attackspambots | Dec 18 07:39:06 xeon sshd[50609]: Failed password for invalid user ormaechea from 145.239.78.59 port 43292 ssh2 |
2019-12-18 16:17:28 |
139.199.158.14 | attackspambots | --- report --- Dec 18 04:57:27 sshd: Connection from 139.199.158.14 port 41100 Dec 18 04:57:29 sshd: Invalid user john from 139.199.158.14 Dec 18 04:57:31 sshd: Failed password for invalid user john from 139.199.158.14 port 41100 ssh2 Dec 18 04:57:32 sshd: Received disconnect from 139.199.158.14: 11: Bye Bye [preauth] |
2019-12-18 16:05:47 |
106.12.15.235 | attack | Dec 18 07:29:06 nextcloud sshd\[28520\]: Invalid user calends from 106.12.15.235 Dec 18 07:29:06 nextcloud sshd\[28520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.15.235 Dec 18 07:29:08 nextcloud sshd\[28520\]: Failed password for invalid user calends from 106.12.15.235 port 60732 ssh2 ... |
2019-12-18 16:31:03 |
167.99.194.54 | attackspambots | 2019-12-18T07:49:32.151790shield sshd\[2196\]: Invalid user www from 167.99.194.54 port 36258 2019-12-18T07:49:32.156036shield sshd\[2196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.194.54 2019-12-18T07:49:33.645549shield sshd\[2196\]: Failed password for invalid user www from 167.99.194.54 port 36258 ssh2 2019-12-18T07:54:50.283356shield sshd\[3417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.194.54 user=root 2019-12-18T07:54:52.426481shield sshd\[3417\]: Failed password for root from 167.99.194.54 port 45788 ssh2 |
2019-12-18 16:00:03 |
113.161.38.62 | attackbotsspam | Honeypot attack, port: 139, PTR: static.vnpt.vn. |
2019-12-18 16:17:57 |
65.229.5.158 | attackspam | 2019-12-18T08:53:24.211411 sshd[31247]: Invalid user freed from 65.229.5.158 port 48341 2019-12-18T08:53:24.226851 sshd[31247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.229.5.158 2019-12-18T08:53:24.211411 sshd[31247]: Invalid user freed from 65.229.5.158 port 48341 2019-12-18T08:53:26.229901 sshd[31247]: Failed password for invalid user freed from 65.229.5.158 port 48341 ssh2 2019-12-18T08:59:05.267563 sshd[31368]: Invalid user taft from 65.229.5.158 port 51389 ... |
2019-12-18 16:13:53 |
110.17.186.130 | attackspam | Honeypot attack, port: 23, PTR: PTR record not found |
2019-12-18 16:14:54 |
5.196.53.225 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2019-12-18 16:21:34 |
124.152.76.213 | attack | 2019-12-18T07:48:18.094411shield sshd\[1939\]: Invalid user rieger from 124.152.76.213 port 29018 2019-12-18T07:48:18.098532shield sshd\[1939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.152.76.213 2019-12-18T07:48:20.427184shield sshd\[1939\]: Failed password for invalid user rieger from 124.152.76.213 port 29018 ssh2 2019-12-18T07:55:57.469033shield sshd\[3856\]: Invalid user 123 from 124.152.76.213 port 51289 2019-12-18T07:55:57.473504shield sshd\[3856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.152.76.213 |
2019-12-18 15:58:38 |
36.77.92.113 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2019-12-18 16:03:00 |
36.112.137.55 | attack | Dec 17 21:53:47 kapalua sshd\[10950\]: Invalid user bibaboo from 36.112.137.55 Dec 17 21:53:47 kapalua sshd\[10950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.137.55 Dec 17 21:53:50 kapalua sshd\[10950\]: Failed password for invalid user bibaboo from 36.112.137.55 port 45697 ssh2 Dec 17 22:00:18 kapalua sshd\[11777\]: Invalid user vcsa from 36.112.137.55 Dec 17 22:00:18 kapalua sshd\[11777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.137.55 |
2019-12-18 16:06:59 |
54.37.151.239 | attack | Dec 18 09:43:55 sauna sshd[20028]: Failed password for games from 54.37.151.239 port 44081 ssh2 ... |
2019-12-18 15:51:50 |