City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.20.163.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45971
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;20.20.163.48. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 14:25:08 CST 2025
;; MSG SIZE rcvd: 105
Host 48.163.20.20.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 48.163.20.20.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 174.138.27.165 | attack | $f2bV_matches |
2020-09-14 21:57:06 |
| 188.35.187.50 | attack | Sep 14 12:00:49 lunarastro sshd[15735]: Failed password for root from 188.35.187.50 port 42764 ssh2 |
2020-09-14 21:36:34 |
| 41.193.122.77 | attackspam | Logfile match |
2020-09-14 21:37:15 |
| 54.37.235.183 | attackbots | Sep 14 08:53:38 rush sshd[28267]: Failed password for root from 54.37.235.183 port 32830 ssh2 Sep 14 08:57:52 rush sshd[28353]: Failed password for root from 54.37.235.183 port 45386 ssh2 ... |
2020-09-14 21:51:21 |
| 117.69.188.17 | attack | Sep 13 20:36:33 srv01 postfix/smtpd\[8700\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 13 20:39:59 srv01 postfix/smtpd\[23344\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 13 20:43:25 srv01 postfix/smtpd\[15615\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 13 20:46:51 srv01 postfix/smtpd\[15615\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 13 20:50:17 srv01 postfix/smtpd\[14316\]: warning: unknown\[117.69.188.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-14 21:52:53 |
| 118.89.231.109 | attack | 2020-09-14T18:17:02.764759hostname sshd[68767]: Invalid user services from 118.89.231.109 port 35217 ... |
2020-09-14 21:39:28 |
| 117.50.13.167 | attack | Sep 14 07:30:34 fhem-rasp sshd[7914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.13.167 user=root Sep 14 07:30:36 fhem-rasp sshd[7914]: Failed password for root from 117.50.13.167 port 52142 ssh2 ... |
2020-09-14 21:50:26 |
| 118.25.196.31 | attackbots | Sep 13 21:47:28 root sshd[26996]: Invalid user heinse from 118.25.196.31 ... |
2020-09-14 21:48:50 |
| 140.143.19.144 | attackspambots | (sshd) Failed SSH login from 140.143.19.144 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 14 13:17:34 server2 sshd[14976]: Invalid user ftpuser from 140.143.19.144 port 48452 Sep 14 13:17:35 server2 sshd[14976]: Failed password for invalid user ftpuser from 140.143.19.144 port 48452 ssh2 Sep 14 13:25:43 server2 sshd[17676]: Invalid user tresmundo from 140.143.19.144 port 33768 Sep 14 13:25:45 server2 sshd[17676]: Failed password for invalid user tresmundo from 140.143.19.144 port 33768 ssh2 Sep 14 13:33:55 server2 sshd[20131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.19.144 user=root |
2020-09-14 22:11:36 |
| 94.142.241.194 | attackspambots | Sep 14 14:41:38 prod4 sshd\[10582\]: Failed password for root from 94.142.241.194 port 18892 ssh2 Sep 14 14:41:40 prod4 sshd\[10582\]: Failed password for root from 94.142.241.194 port 18892 ssh2 Sep 14 14:41:42 prod4 sshd\[10582\]: Failed password for root from 94.142.241.194 port 18892 ssh2 ... |
2020-09-14 22:02:29 |
| 206.189.72.161 | attackspam | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-09-14 22:13:32 |
| 222.186.30.76 | attackspambots | 2020-09-14T13:38:56.181960abusebot-3.cloudsearch.cf sshd[18210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76 user=root 2020-09-14T13:38:57.981811abusebot-3.cloudsearch.cf sshd[18210]: Failed password for root from 222.186.30.76 port 47219 ssh2 2020-09-14T13:38:59.942210abusebot-3.cloudsearch.cf sshd[18210]: Failed password for root from 222.186.30.76 port 47219 ssh2 2020-09-14T13:38:56.181960abusebot-3.cloudsearch.cf sshd[18210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76 user=root 2020-09-14T13:38:57.981811abusebot-3.cloudsearch.cf sshd[18210]: Failed password for root from 222.186.30.76 port 47219 ssh2 2020-09-14T13:38:59.942210abusebot-3.cloudsearch.cf sshd[18210]: Failed password for root from 222.186.30.76 port 47219 ssh2 2020-09-14T13:38:56.181960abusebot-3.cloudsearch.cf sshd[18210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse ... |
2020-09-14 21:42:07 |
| 98.248.156.94 | attack | 2020-09-14T13:18:19.078221abusebot.cloudsearch.cf sshd[5329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-98-248-156-94.hsd1.ca.comcast.net user=root 2020-09-14T13:18:21.062937abusebot.cloudsearch.cf sshd[5329]: Failed password for root from 98.248.156.94 port 52224 ssh2 2020-09-14T13:22:04.082602abusebot.cloudsearch.cf sshd[5380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-98-248-156-94.hsd1.ca.comcast.net user=root 2020-09-14T13:22:06.286564abusebot.cloudsearch.cf sshd[5380]: Failed password for root from 98.248.156.94 port 56078 ssh2 2020-09-14T13:25:52.292278abusebot.cloudsearch.cf sshd[5433]: Invalid user nologin from 98.248.156.94 port 59931 2020-09-14T13:25:52.297935abusebot.cloudsearch.cf sshd[5433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-98-248-156-94.hsd1.ca.comcast.net 2020-09-14T13:25:52.292278abusebot.cloudsearch.cf sshd[5433]: I ... |
2020-09-14 22:04:54 |
| 212.33.199.172 | attackbots | Sep 14 09:30:34 Ubuntu-1404-trusty-64-minimal sshd\[17798\]: Invalid user ansible from 212.33.199.172 Sep 14 09:30:34 Ubuntu-1404-trusty-64-minimal sshd\[17798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.33.199.172 Sep 14 09:30:37 Ubuntu-1404-trusty-64-minimal sshd\[17798\]: Failed password for invalid user ansible from 212.33.199.172 port 37560 ssh2 Sep 14 09:30:51 Ubuntu-1404-trusty-64-minimal sshd\[18616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.33.199.172 user=root Sep 14 09:30:53 Ubuntu-1404-trusty-64-minimal sshd\[18616\]: Failed password for root from 212.33.199.172 port 48998 ssh2 |
2020-09-14 21:45:44 |
| 103.148.15.38 | attackbots | Automatic report - Banned IP Access |
2020-09-14 22:00:14 |