City: unknown
Region: unknown
Country: China
Internet Service Provider: China Tietong
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 175.50.91.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18710
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;175.50.91.74. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031002 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 11 08:36:53 CST 2025
;; MSG SIZE rcvd: 105
Host 74.91.50.175.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 74.91.50.175.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 93.42.117.137 | attackspam | Sep 1 03:47:26 sachi sshd\[21523\]: Invalid user sybase from 93.42.117.137 Sep 1 03:47:26 sachi sshd\[21523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93-42-117-137.ip86.fastwebnet.it Sep 1 03:47:27 sachi sshd\[21523\]: Failed password for invalid user sybase from 93.42.117.137 port 45378 ssh2 Sep 1 03:52:19 sachi sshd\[21948\]: Invalid user jjs from 93.42.117.137 Sep 1 03:52:19 sachi sshd\[21948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93-42-117-137.ip86.fastwebnet.it |
2019-09-01 22:07:20 |
| 111.198.22.130 | attackbots | Sep 1 13:49:28 rotator sshd\[32746\]: Invalid user admin1 from 111.198.22.130Sep 1 13:49:30 rotator sshd\[32746\]: Failed password for invalid user admin1 from 111.198.22.130 port 45908 ssh2Sep 1 13:54:10 rotator sshd\[1064\]: Invalid user temp from 111.198.22.130Sep 1 13:54:12 rotator sshd\[1064\]: Failed password for invalid user temp from 111.198.22.130 port 33116 ssh2Sep 1 13:58:56 rotator sshd\[1871\]: Invalid user ldap from 111.198.22.130Sep 1 13:58:58 rotator sshd\[1871\]: Failed password for invalid user ldap from 111.198.22.130 port 48568 ssh2 ... |
2019-09-01 22:50:45 |
| 23.129.64.188 | attack | Sep 1 09:07:12 rotator sshd\[18612\]: Failed password for root from 23.129.64.188 port 65359 ssh2Sep 1 09:07:15 rotator sshd\[18612\]: Failed password for root from 23.129.64.188 port 65359 ssh2Sep 1 09:07:18 rotator sshd\[18612\]: Failed password for root from 23.129.64.188 port 65359 ssh2Sep 1 09:07:21 rotator sshd\[18612\]: Failed password for root from 23.129.64.188 port 65359 ssh2Sep 1 09:07:23 rotator sshd\[18612\]: Failed password for root from 23.129.64.188 port 65359 ssh2Sep 1 09:07:26 rotator sshd\[18612\]: Failed password for root from 23.129.64.188 port 65359 ssh2 ... |
2019-09-01 22:13:06 |
| 82.64.45.6 | attackspambots | Automatic report - Port Scan Attack |
2019-09-01 21:53:16 |
| 1.56.207.131 | attackspam | Sep 1 16:03:11 yabzik sshd[17587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.56.207.131 Sep 1 16:03:13 yabzik sshd[17587]: Failed password for invalid user user from 1.56.207.131 port 5407 ssh2 Sep 1 16:07:50 yabzik sshd[19352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.56.207.131 |
2019-09-01 22:14:04 |
| 101.255.56.42 | attackspambots | Automatic report - Banned IP Access |
2019-09-01 22:48:41 |
| 192.117.186.215 | attackspam | Sep 1 04:25:04 sachi sshd\[24767\]: Invalid user rock from 192.117.186.215 Sep 1 04:25:04 sachi sshd\[24767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.117.186.215 Sep 1 04:25:06 sachi sshd\[24767\]: Failed password for invalid user rock from 192.117.186.215 port 48754 ssh2 Sep 1 04:29:46 sachi sshd\[25148\]: Invalid user vision from 192.117.186.215 Sep 1 04:29:46 sachi sshd\[25148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.117.186.215 |
2019-09-01 22:30:38 |
| 202.112.237.228 | attackbotsspam | Sep 1 11:12:28 minden010 sshd[30523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.112.237.228 Sep 1 11:12:30 minden010 sshd[30523]: Failed password for invalid user support from 202.112.237.228 port 48162 ssh2 Sep 1 11:14:43 minden010 sshd[31238]: Failed password for root from 202.112.237.228 port 39928 ssh2 ... |
2019-09-01 21:58:37 |
| 92.118.37.82 | attackbots | Sep 1 15:12:04 h2177944 kernel: \[220193.304652\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.82 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=54853 PROTO=TCP SPT=55326 DPT=22871 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 1 15:12:36 h2177944 kernel: \[220225.289240\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.82 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=2701 PROTO=TCP SPT=55326 DPT=24579 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 1 15:13:08 h2177944 kernel: \[220257.325049\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.82 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=63803 PROTO=TCP SPT=55326 DPT=21418 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 1 15:16:12 h2177944 kernel: \[220441.310038\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.82 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=27896 PROTO=TCP SPT=55326 DPT=22856 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 1 15:16:48 h2177944 kernel: \[220476.802125\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.118.37.82 DST=85.214.117.9 LEN=40 |
2019-09-01 22:23:21 |
| 5.57.33.71 | attack | Sep 1 16:55:14 yabzik sshd[7720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.57.33.71 Sep 1 16:55:17 yabzik sshd[7720]: Failed password for invalid user guest from 5.57.33.71 port 44459 ssh2 Sep 1 16:59:26 yabzik sshd[8885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.57.33.71 |
2019-09-01 22:02:01 |
| 14.162.167.6 | attackspambots | Sep 1 09:07:22 nginx sshd[80659]: Invalid user admin from 14.162.167.6 Sep 1 09:07:23 nginx sshd[80659]: Connection closed by 14.162.167.6 port 53418 [preauth] |
2019-09-01 22:15:01 |
| 150.249.114.20 | attackspambots | $f2bV_matches |
2019-09-01 22:55:10 |
| 187.189.232.39 | attack | port scan and connect, tcp 80 (http) |
2019-09-01 22:56:31 |
| 193.68.57.155 | attackbotsspam | Sep 1 03:04:27 sachi sshd\[17555\]: Invalid user marketing from 193.68.57.155 Sep 1 03:04:27 sachi sshd\[17555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.68.57.155 Sep 1 03:04:28 sachi sshd\[17555\]: Failed password for invalid user marketing from 193.68.57.155 port 45308 ssh2 Sep 1 03:08:43 sachi sshd\[17894\]: Invalid user jjs from 193.68.57.155 Sep 1 03:08:43 sachi sshd\[17894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.68.57.155 |
2019-09-01 21:48:00 |
| 218.60.34.22 | attackbots | Aug 29 17:03:14 itv-usvr-01 sshd[4255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.60.34.22 user=root Aug 29 17:03:16 itv-usvr-01 sshd[4255]: Failed password for root from 218.60.34.22 port 56942 ssh2 Aug 29 17:12:30 itv-usvr-01 sshd[5060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.60.34.22 user=root Aug 29 17:12:31 itv-usvr-01 sshd[5060]: Failed password for root from 218.60.34.22 port 36466 ssh2 |
2019-09-01 22:46:48 |