City: unknown
Region: unknown
Country: Korea (the Republic of)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.52.200.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14127
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;211.52.200.12. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 10:37:19 CST 2025
;; MSG SIZE rcvd: 106
Host 12.200.52.211.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 12.200.52.211.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 142.93.90.202 | attackbotsspam | $f2bV_matches |
2019-07-27 09:54:28 |
| 219.148.31.182 | attackbotsspam | 2019-07-26T19:44:21.955252abusebot-3.cloudsearch.cf sshd\[12397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.148.31.182 user=root |
2019-07-27 09:26:21 |
| 153.36.240.126 | attackbots | Jul 26 19:58:38 aat-srv002 sshd[10118]: Failed password for root from 153.36.240.126 port 13956 ssh2 Jul 26 19:58:40 aat-srv002 sshd[10118]: Failed password for root from 153.36.240.126 port 13956 ssh2 Jul 26 19:58:42 aat-srv002 sshd[10118]: Failed password for root from 153.36.240.126 port 13956 ssh2 Jul 26 19:58:48 aat-srv002 sshd[10131]: Failed password for root from 153.36.240.126 port 43715 ssh2 ... |
2019-07-27 09:12:09 |
| 192.236.208.224 | attackspam | SSH Brute Force |
2019-07-27 09:11:32 |
| 144.202.41.83 | attackbotsspam | Jul 27 03:09:39 srv-4 sshd\[31953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.202.41.83 user=root Jul 27 03:09:42 srv-4 sshd\[31953\]: Failed password for root from 144.202.41.83 port 33634 ssh2 Jul 27 03:13:49 srv-4 sshd\[32090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.202.41.83 user=root ... |
2019-07-27 09:09:43 |
| 170.0.125.50 | attackspambots | [Aegis] @ 2019-07-26 20:44:30 0100 -> Multiple attempts to send e-mail from invalid/unknown sender domain. |
2019-07-27 09:17:58 |
| 52.169.88.152 | attack | Jul 26 23:20:10 yabzik sshd[22492]: Failed password for root from 52.169.88.152 port 53338 ssh2 Jul 26 23:24:35 yabzik sshd[23684]: Failed password for root from 52.169.88.152 port 48634 ssh2 |
2019-07-27 09:44:48 |
| 78.247.18.64 | attackspam | Jul 26 22:38:15 srv-4 sshd\[25313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.247.18.64 user=root Jul 26 22:38:17 srv-4 sshd\[25313\]: Failed password for root from 78.247.18.64 port 42458 ssh2 Jul 26 22:44:03 srv-4 sshd\[25839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.247.18.64 user=root ... |
2019-07-27 09:37:44 |
| 104.248.4.117 | attackbotsspam | Jul 27 02:48:35 OPSO sshd\[13678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.4.117 user=root Jul 27 02:48:36 OPSO sshd\[13678\]: Failed password for root from 104.248.4.117 port 52778 ssh2 Jul 27 02:52:48 OPSO sshd\[14097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.4.117 user=root Jul 27 02:52:50 OPSO sshd\[14097\]: Failed password for root from 104.248.4.117 port 48084 ssh2 Jul 27 02:57:10 OPSO sshd\[14789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.4.117 user=root |
2019-07-27 09:14:10 |
| 178.128.150.158 | attackbotsspam | 2019-07-26T19:43:27.410173abusebot-2.cloudsearch.cf sshd\[17808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.150.158 user=root |
2019-07-27 10:00:01 |
| 3.15.93.13 | attackspambots | Jul 26 21:39:11 host sshd\[40776\]: Failed password for root from 3.15.93.13 port 54340 ssh2 Jul 26 21:45:00 host sshd\[43548\]: Failed password for root from 3.15.93.13 port 40132 ssh2 ... |
2019-07-27 09:03:46 |
| 175.150.109.145 | attackspam | " " |
2019-07-27 09:17:05 |
| 51.75.251.153 | attackbotsspam | Jul 27 02:15:26 debian sshd\[22748\]: Invalid user 123168425 from 51.75.251.153 port 55216 Jul 27 02:15:26 debian sshd\[22748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.251.153 ... |
2019-07-27 09:16:16 |
| 201.251.10.200 | attackbotsspam | Repeated brute force against a port |
2019-07-27 09:37:10 |
| 71.56.47.93 | attackspam | Jul 26 23:47:09 srv-4 sshd\[22674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.56.47.93 user=root Jul 26 23:47:11 srv-4 sshd\[22674\]: Failed password for root from 71.56.47.93 port 41894 ssh2 Jul 26 23:52:38 srv-4 sshd\[23055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.56.47.93 user=root ... |
2019-07-27 09:05:52 |