City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.46.53.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13489
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;252.46.53.16. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 17:21:23 CST 2025
;; MSG SIZE rcvd: 105
Host 16.53.46.252.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 16.53.46.252.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 190.122.185.174 | attack | Fail2Ban Ban Triggered HTTP Exploit Attempt |
2020-08-27 23:11:53 |
| 178.47.132.162 | attackspam | Unauthorized connection attempt from IP address 178.47.132.162 on Port 445(SMB) |
2020-08-27 23:20:28 |
| 117.232.67.147 | attackbotsspam | Unauthorized connection attempt from IP address 117.232.67.147 on Port 445(SMB) |
2020-08-27 23:10:27 |
| 140.143.233.29 | attack | 21 attempts against mh-ssh on echoip |
2020-08-27 23:07:32 |
| 94.159.31.10 | attackspam | SSH Login Bruteforce |
2020-08-27 23:10:47 |
| 14.189.120.157 | attack | Unauthorized connection attempt from IP address 14.189.120.157 on Port 445(SMB) |
2020-08-27 22:57:26 |
| 122.51.226.79 | attackspam | (sshd) Failed SSH login from 122.51.226.79 (CN/China/-): 5 in the last 3600 secs |
2020-08-27 23:00:23 |
| 42.200.179.226 | attackspam | Brute Force |
2020-08-27 23:32:56 |
| 95.85.30.24 | attack | Aug 27 17:02:52 PorscheCustomer sshd[25810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.30.24 Aug 27 17:02:54 PorscheCustomer sshd[25810]: Failed password for invalid user and from 95.85.30.24 port 46756 ssh2 Aug 27 17:08:19 PorscheCustomer sshd[25905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.30.24 ... |
2020-08-27 23:09:39 |
| 14.177.239.168 | attackbots | Aug 27 16:03:51 OPSO sshd\[22708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.177.239.168 user=root Aug 27 16:03:52 OPSO sshd\[22708\]: Failed password for root from 14.177.239.168 port 54025 ssh2 Aug 27 16:06:39 OPSO sshd\[23277\]: Invalid user www-data from 14.177.239.168 port 60227 Aug 27 16:06:39 OPSO sshd\[23277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.177.239.168 Aug 27 16:06:40 OPSO sshd\[23277\]: Failed password for invalid user www-data from 14.177.239.168 port 60227 ssh2 |
2020-08-27 23:08:19 |
| 112.85.42.176 | attack | Aug 27 17:09:10 nextcloud sshd\[16636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176 user=root Aug 27 17:09:13 nextcloud sshd\[16636\]: Failed password for root from 112.85.42.176 port 44197 ssh2 Aug 27 17:09:17 nextcloud sshd\[16636\]: Failed password for root from 112.85.42.176 port 44197 ssh2 |
2020-08-27 23:14:07 |
| 180.249.115.181 | attackspambots | Unauthorized connection attempt from IP address 180.249.115.181 on Port 445(SMB) |
2020-08-27 22:50:17 |
| 149.56.99.85 | attack | Aug 27 15:01:08 rancher-0 sshd[1303504]: Failed password for root from 149.56.99.85 port 34618 ssh2 Aug 27 15:01:10 rancher-0 sshd[1303504]: error: maximum authentication attempts exceeded for root from 149.56.99.85 port 34618 ssh2 [preauth] ... |
2020-08-27 23:31:44 |
| 181.50.251.25 | attack | Aug 27 15:05:17 MainVPS sshd[23344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.50.251.25 user=root Aug 27 15:05:18 MainVPS sshd[23344]: Failed password for root from 181.50.251.25 port 28279 ssh2 Aug 27 15:07:44 MainVPS sshd[24330]: Invalid user kim from 181.50.251.25 port 45942 Aug 27 15:07:44 MainVPS sshd[24330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.50.251.25 Aug 27 15:07:44 MainVPS sshd[24330]: Invalid user kim from 181.50.251.25 port 45942 Aug 27 15:07:47 MainVPS sshd[24330]: Failed password for invalid user kim from 181.50.251.25 port 45942 ssh2 ... |
2020-08-27 23:05:33 |
| 103.42.99.3 | attackspam | Unauthorized connection attempt from IP address 103.42.99.3 on Port 445(SMB) |
2020-08-27 23:14:30 |