City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 173.93.39.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 360
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;173.93.39.218. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400
;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 12:32:42 CST 2025
;; MSG SIZE rcvd: 106
218.39.93.173.in-addr.arpa domain name pointer syn-173-093-039-218.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
218.39.93.173.in-addr.arpa name = syn-173-093-039-218.res.spectrum.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
39.97.96.91 | attackbotsspam | Unauthorized connection attempt detected from IP address 39.97.96.91 to port 14430 |
2020-06-25 17:50:45 |
52.230.7.48 | attackspam | 2020-06-25T05:28:44.846385mail.thespaminator.com sshd[26559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.230.7.48 user=root 2020-06-25T05:28:46.663358mail.thespaminator.com sshd[26559]: Failed password for root from 52.230.7.48 port 9714 ssh2 ... |
2020-06-25 18:04:22 |
132.145.160.32 | attack | Jun 25 12:09:51 * sshd[14435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.160.32 Jun 25 12:09:53 * sshd[14435]: Failed password for invalid user staffc from 132.145.160.32 port 58484 ssh2 |
2020-06-25 18:16:39 |
139.59.254.93 | attack | Jun 25 11:51:19 eventyay sshd[28828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.254.93 Jun 25 11:51:22 eventyay sshd[28828]: Failed password for invalid user shreya1 from 139.59.254.93 port 35411 ssh2 Jun 25 11:54:39 eventyay sshd[28915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.254.93 ... |
2020-06-25 18:15:16 |
46.6.14.168 | attackspam | Port scanning [2 denied] |
2020-06-25 17:48:53 |
107.175.87.152 | attackbots | Jun 25 11:55:16 debian-2gb-nbg1-2 kernel: \[15337578.570661\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=107.175.87.152 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=43154 DPT=8088 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-06-25 18:03:20 |
112.85.42.176 | attackbotsspam | 2020-06-25T12:20:57.509843ns386461 sshd\[18235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176 user=root 2020-06-25T12:20:59.430426ns386461 sshd\[18235\]: Failed password for root from 112.85.42.176 port 16475 ssh2 2020-06-25T12:21:02.792667ns386461 sshd\[18235\]: Failed password for root from 112.85.42.176 port 16475 ssh2 2020-06-25T12:21:06.370537ns386461 sshd\[18235\]: Failed password for root from 112.85.42.176 port 16475 ssh2 2020-06-25T12:21:09.695646ns386461 sshd\[18235\]: Failed password for root from 112.85.42.176 port 16475 ssh2 ... |
2020-06-25 18:23:37 |
140.203.204.59 | attackspambots | Jun 25 10:35:18 gestao sshd[5922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.203.204.59 Jun 25 10:35:20 gestao sshd[5922]: Failed password for invalid user cy from 140.203.204.59 port 48372 ssh2 Jun 25 10:38:04 gestao sshd[5990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.203.204.59 ... |
2020-06-25 17:59:56 |
91.134.143.172 | attackbots | Invalid user ly from 91.134.143.172 port 43170 |
2020-06-25 18:22:05 |
85.209.0.103 | attack | 2020-06-25T04:18:01.878053linuxbox-skyline sshd[193165]: Invalid user admin from 85.209.0.103 port 33002 ... |
2020-06-25 18:22:33 |
111.229.122.177 | attackbotsspam | Jun 25 08:04:33 OPSO sshd\[32679\]: Invalid user user03 from 111.229.122.177 port 34542 Jun 25 08:04:33 OPSO sshd\[32679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.122.177 Jun 25 08:04:34 OPSO sshd\[32679\]: Failed password for invalid user user03 from 111.229.122.177 port 34542 ssh2 Jun 25 08:11:21 OPSO sshd\[2468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.122.177 user=root Jun 25 08:11:23 OPSO sshd\[2468\]: Failed password for root from 111.229.122.177 port 46646 ssh2 |
2020-06-25 17:46:12 |
61.177.172.102 | attackspambots | 2020-06-25T12:19:54.599437vps751288.ovh.net sshd\[30608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.102 user=root 2020-06-25T12:19:56.540954vps751288.ovh.net sshd\[30608\]: Failed password for root from 61.177.172.102 port 22443 ssh2 2020-06-25T12:19:58.748305vps751288.ovh.net sshd\[30608\]: Failed password for root from 61.177.172.102 port 22443 ssh2 2020-06-25T12:20:00.704624vps751288.ovh.net sshd\[30608\]: Failed password for root from 61.177.172.102 port 22443 ssh2 2020-06-25T12:20:03.831327vps751288.ovh.net sshd\[30620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.102 user=root |
2020-06-25 18:20:19 |
112.85.42.172 | attackspam | Jun 25 11:46:08 server sshd[45659]: Failed none for root from 112.85.42.172 port 44418 ssh2 Jun 25 11:46:11 server sshd[45659]: Failed password for root from 112.85.42.172 port 44418 ssh2 Jun 25 11:46:15 server sshd[45659]: Failed password for root from 112.85.42.172 port 44418 ssh2 |
2020-06-25 17:57:59 |
129.211.107.59 | attackspam | Jun 25 09:56:30 ns382633 sshd\[26493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.107.59 user=root Jun 25 09:56:32 ns382633 sshd\[26493\]: Failed password for root from 129.211.107.59 port 48808 ssh2 Jun 25 10:15:28 ns382633 sshd\[30008\]: Invalid user sakura from 129.211.107.59 port 36202 Jun 25 10:15:28 ns382633 sshd\[30008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.107.59 Jun 25 10:15:30 ns382633 sshd\[30008\]: Failed password for invalid user sakura from 129.211.107.59 port 36202 ssh2 |
2020-06-25 18:10:26 |
74.138.125.204 | attackspambots | Scanning |
2020-06-25 18:27:37 |