City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.72.92.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7861
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;252.72.92.45. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 08:46:11 CST 2025
;; MSG SIZE rcvd: 105
Host 45.92.72.252.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 45.92.72.252.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.244.25.139 | attack | Sep 29 11:40:52 web1 sshd\[32137\]: Invalid user qe from 185.244.25.139 Sep 29 11:40:52 web1 sshd\[32137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.244.25.139 Sep 29 11:40:54 web1 sshd\[32137\]: Failed password for invalid user qe from 185.244.25.139 port 34174 ssh2 Sep 29 11:46:40 web1 sshd\[32703\]: Invalid user both from 185.244.25.139 Sep 29 11:46:40 web1 sshd\[32703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.244.25.139 |
2019-09-30 05:50:57 |
| 200.157.34.121 | attackbotsspam | Sep 29 11:43:17 web1 sshd\[32380\]: Invalid user hilltun from 200.157.34.121 Sep 29 11:43:17 web1 sshd\[32380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.157.34.121 Sep 29 11:43:20 web1 sshd\[32380\]: Failed password for invalid user hilltun from 200.157.34.121 port 43130 ssh2 Sep 29 11:48:06 web1 sshd\[394\]: Invalid user susan from 200.157.34.121 Sep 29 11:48:06 web1 sshd\[394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.157.34.121 |
2019-09-30 06:02:14 |
| 193.70.109.193 | attack | Sep 29 11:43:55 web1 sshd\[32448\]: Invalid user servicedesk from 193.70.109.193 Sep 29 11:43:55 web1 sshd\[32448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.109.193 Sep 29 11:43:56 web1 sshd\[32448\]: Failed password for invalid user servicedesk from 193.70.109.193 port 57900 ssh2 Sep 29 11:49:48 web1 sshd\[598\]: Invalid user login from 193.70.109.193 Sep 29 11:49:48 web1 sshd\[598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.109.193 |
2019-09-30 06:01:18 |
| 179.111.200.245 | attackbotsspam | Reported by AbuseIPDB proxy server. |
2019-09-30 05:55:34 |
| 153.36.236.35 | attackspambots | Sep 29 17:31:33 ny01 sshd[25495]: Failed password for root from 153.36.236.35 port 35068 ssh2 Sep 29 17:31:33 ny01 sshd[25496]: Failed password for root from 153.36.236.35 port 17094 ssh2 Sep 29 17:31:35 ny01 sshd[25495]: Failed password for root from 153.36.236.35 port 35068 ssh2 |
2019-09-30 05:37:23 |
| 5.45.6.66 | attackbotsspam | Sep 29 23:58:56 icinga sshd[27079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.45.6.66 Sep 29 23:58:58 icinga sshd[27079]: Failed password for invalid user xxl from 5.45.6.66 port 48558 ssh2 ... |
2019-09-30 06:06:28 |
| 61.147.182.140 | attack | Sep 29 17:17:56 xtremcommunity sshd\[7774\]: Invalid user mongod123 from 61.147.182.140 port 37272 Sep 29 17:17:56 xtremcommunity sshd\[7774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.147.182.140 Sep 29 17:17:58 xtremcommunity sshd\[7774\]: Failed password for invalid user mongod123 from 61.147.182.140 port 37272 ssh2 Sep 29 17:20:26 xtremcommunity sshd\[7834\]: Invalid user v from 61.147.182.140 port 49918 Sep 29 17:20:26 xtremcommunity sshd\[7834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.147.182.140 ... |
2019-09-30 05:39:54 |
| 116.7.11.218 | attackspambots | 445/tcp [2019-09-29]1pkt |
2019-09-30 05:43:01 |
| 115.73.214.234 | attackspam | 34567/tcp [2019-09-29]1pkt |
2019-09-30 05:55:56 |
| 222.186.52.107 | attackspambots | 2019-09-30T04:53:20.491895enmeeting.mahidol.ac.th sshd\[18326\]: User root from 222.186.52.107 not allowed because not listed in AllowUsers 2019-09-30T04:53:21.750865enmeeting.mahidol.ac.th sshd\[18326\]: Failed none for invalid user root from 222.186.52.107 port 31252 ssh2 2019-09-30T04:53:23.118924enmeeting.mahidol.ac.th sshd\[18326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.107 user=root ... |
2019-09-30 06:03:57 |
| 222.186.31.136 | attack | Sep 29 11:29:53 tdfoods sshd\[24634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136 user=root Sep 29 11:29:56 tdfoods sshd\[24634\]: Failed password for root from 222.186.31.136 port 34132 ssh2 Sep 29 11:34:27 tdfoods sshd\[25036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136 user=root Sep 29 11:34:30 tdfoods sshd\[25036\]: Failed password for root from 222.186.31.136 port 36643 ssh2 Sep 29 11:34:32 tdfoods sshd\[25036\]: Failed password for root from 222.186.31.136 port 36643 ssh2 |
2019-09-30 05:36:29 |
| 159.203.139.128 | attack | Sep 29 23:24:07 mail sshd\[23093\]: Failed password for invalid user support from 159.203.139.128 port 41988 ssh2 Sep 29 23:27:56 mail sshd\[23461\]: Invalid user a from 159.203.139.128 port 53596 Sep 29 23:27:56 mail sshd\[23461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.139.128 Sep 29 23:27:58 mail sshd\[23461\]: Failed password for invalid user a from 159.203.139.128 port 53596 ssh2 Sep 29 23:31:52 mail sshd\[23803\]: Invalid user ef from 159.203.139.128 port 36964 |
2019-09-30 05:41:43 |
| 182.61.132.165 | attack | Sep 29 23:28:20 mail sshd\[23492\]: Invalid user kaffee from 182.61.132.165 port 51458 Sep 29 23:28:20 mail sshd\[23492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.132.165 Sep 29 23:28:22 mail sshd\[23492\]: Failed password for invalid user kaffee from 182.61.132.165 port 51458 ssh2 Sep 29 23:32:29 mail sshd\[23870\]: Invalid user smmsp from 182.61.132.165 port 60746 Sep 29 23:32:29 mail sshd\[23870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.132.165 |
2019-09-30 05:41:21 |
| 121.226.109.244 | attack | 23/tcp [2019-09-29]1pkt |
2019-09-30 05:45:37 |
| 110.165.37.23 | attackbots | 2019-09-29T21:13:04Z - RDP login failed multiple times. (110.165.37.23) |
2019-09-30 05:47:24 |