City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.142.0.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62337
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.142.0.155. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 06:06:11 CST 2025
;; MSG SIZE rcvd: 106
Host 155.0.142.216.in-addr.arpa not found: 2(SERVFAIL)
server can't find 216.142.0.155.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
80.68.105.7 | attackspam | Port scan: Attack repeated for 24 hours |
2020-08-05 05:44:43 |
37.59.43.63 | attack | 2020-08-04T16:15:37.625214morrigan.ad5gb.com sshd[2814936]: Failed password for root from 37.59.43.63 port 52592 ssh2 2020-08-04T16:15:38.511129morrigan.ad5gb.com sshd[2814936]: Disconnected from authenticating user root 37.59.43.63 port 52592 [preauth] |
2020-08-05 06:09:59 |
187.174.65.4 | attack | Aug 4 18:35:24 localhost sshd[35950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.174.65.4 user=root Aug 4 18:35:26 localhost sshd[35950]: Failed password for root from 187.174.65.4 port 47876 ssh2 Aug 4 18:39:15 localhost sshd[36360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.174.65.4 user=root Aug 4 18:39:17 localhost sshd[36360]: Failed password for root from 187.174.65.4 port 57466 ssh2 Aug 4 18:43:01 localhost sshd[36850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.174.65.4 user=root Aug 4 18:43:03 localhost sshd[36850]: Failed password for root from 187.174.65.4 port 38824 ssh2 ... |
2020-08-05 05:36:33 |
122.51.102.227 | attack | Aug 4 21:54:30 buvik sshd[9807]: Failed password for root from 122.51.102.227 port 36952 ssh2 Aug 4 21:57:12 buvik sshd[10167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.102.227 user=root Aug 4 21:57:13 buvik sshd[10167]: Failed password for root from 122.51.102.227 port 34610 ssh2 ... |
2020-08-05 05:46:57 |
94.102.50.191 | attackspambots | smtp |
2020-08-05 05:42:42 |
159.203.111.100 | attackbotsspam | 2020-08-04T15:43:40.704686linuxbox-skyline sshd[75460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.111.100 user=root 2020-08-04T15:43:42.740605linuxbox-skyline sshd[75460]: Failed password for root from 159.203.111.100 port 53978 ssh2 ... |
2020-08-05 05:50:53 |
178.128.226.2 | attackspam | Aug 5 01:04:23 lukav-desktop sshd\[13098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 user=root Aug 5 01:04:26 lukav-desktop sshd\[13098\]: Failed password for root from 178.128.226.2 port 43711 ssh2 Aug 5 01:07:33 lukav-desktop sshd\[19572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 user=root Aug 5 01:07:36 lukav-desktop sshd\[19572\]: Failed password for root from 178.128.226.2 port 43329 ssh2 Aug 5 01:10:52 lukav-desktop sshd\[25600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.226.2 user=root |
2020-08-05 06:13:50 |
94.113.242.20 | attack | SpamScore above: 10.0 |
2020-08-05 06:00:59 |
106.245.217.25 | attack | (sshd) Failed SSH login from 106.245.217.25 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 4 23:34:36 srv sshd[5550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.245.217.25 user=root Aug 4 23:34:38 srv sshd[5550]: Failed password for root from 106.245.217.25 port 54552 ssh2 Aug 4 23:38:40 srv sshd[5631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.245.217.25 user=root Aug 4 23:38:43 srv sshd[5631]: Failed password for root from 106.245.217.25 port 54223 ssh2 Aug 4 23:41:04 srv sshd[5714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.245.217.25 user=root |
2020-08-05 06:04:36 |
141.98.9.161 | attack | Aug 2 15:06:15 sip sshd[12838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161 Aug 2 15:06:17 sip sshd[12838]: Failed password for invalid user admin from 141.98.9.161 port 35193 ssh2 Aug 2 15:06:37 sip sshd[13040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161 |
2020-08-05 05:38:45 |
31.154.9.174 | attack | $f2bV_matches |
2020-08-05 05:56:25 |
95.70.183.231 | attackbotsspam | Port probing on unauthorized port 445 |
2020-08-05 06:07:17 |
106.37.72.234 | attack | Aug 4 18:04:29 Host-KEWR-E sshd[2538]: Disconnected from invalid user root 106.37.72.234 port 58344 [preauth] ... |
2020-08-05 06:09:28 |
222.186.31.166 | attack | 2020-08-04T21:59:06.971076abusebot.cloudsearch.cf sshd[8115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166 user=root 2020-08-04T21:59:08.463887abusebot.cloudsearch.cf sshd[8115]: Failed password for root from 222.186.31.166 port 42428 ssh2 2020-08-04T21:59:10.375915abusebot.cloudsearch.cf sshd[8115]: Failed password for root from 222.186.31.166 port 42428 ssh2 2020-08-04T21:59:06.971076abusebot.cloudsearch.cf sshd[8115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166 user=root 2020-08-04T21:59:08.463887abusebot.cloudsearch.cf sshd[8115]: Failed password for root from 222.186.31.166 port 42428 ssh2 2020-08-04T21:59:10.375915abusebot.cloudsearch.cf sshd[8115]: Failed password for root from 222.186.31.166 port 42428 ssh2 2020-08-04T21:59:06.971076abusebot.cloudsearch.cf sshd[8115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.18 ... |
2020-08-05 06:05:24 |
139.59.3.114 | attackspambots | Jul 31 02:42:41 prox sshd[19852]: Failed password for root from 139.59.3.114 port 47259 ssh2 |
2020-08-05 05:47:33 |