City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 252.83.150.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58232
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;252.83.150.54. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 20:17:31 CST 2025
;; MSG SIZE rcvd: 106
Host 54.150.83.252.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 54.150.83.252.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 113.141.28.106 | attack | Sep 30 11:23:25 tdfoods sshd\[26011\]: Invalid user user from 113.141.28.106 Sep 30 11:23:25 tdfoods sshd\[26011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.141.28.106 Sep 30 11:23:27 tdfoods sshd\[26011\]: Failed password for invalid user user from 113.141.28.106 port 24516 ssh2 Sep 30 11:27:06 tdfoods sshd\[26323\]: Invalid user user from 113.141.28.106 Sep 30 11:27:06 tdfoods sshd\[26323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.141.28.106 |
2019-10-01 06:35:48 |
| 139.59.180.53 | attackbots | SSH authentication failure x 6 reported by Fail2Ban ... |
2019-10-01 06:44:53 |
| 91.218.67.141 | attackbots | Sep 30 12:13:49 hanapaa sshd\[3892\]: Invalid user qa from 91.218.67.141 Sep 30 12:13:49 hanapaa sshd\[3892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.218.67.141 Sep 30 12:13:51 hanapaa sshd\[3892\]: Failed password for invalid user qa from 91.218.67.141 port 54082 ssh2 Sep 30 12:18:38 hanapaa sshd\[4284\]: Invalid user jasper from 91.218.67.141 Sep 30 12:18:38 hanapaa sshd\[4284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.218.67.141 |
2019-10-01 06:19:55 |
| 185.39.194.84 | attackspam | [portscan] Port scan |
2019-10-01 06:45:17 |
| 218.218.37.136 | attackbotsspam | Unauthorised access (Sep 30) SRC=218.218.37.136 LEN=40 TTL=53 ID=57129 TCP DPT=8080 WINDOW=46316 SYN |
2019-10-01 06:23:56 |
| 51.38.237.78 | attackspam | Sep 30 12:15:51 web9 sshd\[13936\]: Invalid user demo from 51.38.237.78 Sep 30 12:15:51 web9 sshd\[13936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.237.78 Sep 30 12:15:53 web9 sshd\[13936\]: Failed password for invalid user demo from 51.38.237.78 port 56788 ssh2 Sep 30 12:25:15 web9 sshd\[15755\]: Invalid user admin1 from 51.38.237.78 Sep 30 12:25:15 web9 sshd\[15755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.237.78 |
2019-10-01 06:44:08 |
| 61.135.169.125 | attackspambots | Port scan attempt detected by AWS-CCS, CTS, India |
2019-10-01 06:26:00 |
| 91.121.109.45 | attackbots | Sep 30 23:40:19 vps691689 sshd[18859]: Failed password for root from 91.121.109.45 port 38211 ssh2 Sep 30 23:44:08 vps691689 sshd[18928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.109.45 ... |
2019-10-01 06:40:56 |
| 217.7.239.117 | attackspambots | $f2bV_matches |
2019-10-01 06:35:01 |
| 60.220.230.21 | attackbotsspam | 2019-10-01T01:18:38.086954tmaserv sshd\[27069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.230.21 2019-10-01T01:18:39.644841tmaserv sshd\[27069\]: Failed password for invalid user 123456 from 60.220.230.21 port 47241 ssh2 2019-10-01T01:34:32.641016tmaserv sshd\[27907\]: Invalid user 123456 from 60.220.230.21 port 54472 2019-10-01T01:34:32.643595tmaserv sshd\[27907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.230.21 2019-10-01T01:34:34.501777tmaserv sshd\[27907\]: Failed password for invalid user 123456 from 60.220.230.21 port 54472 ssh2 2019-10-01T01:38:18.942142tmaserv sshd\[28166\]: Invalid user huawei123 from 60.220.230.21 port 42162 2019-10-01T01:38:18.944669tmaserv sshd\[28166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.230.21 ... |
2019-10-01 06:52:35 |
| 116.16.150.139 | attackbots | Sep 30 22:58:06 ns3367391 proftpd\[22535\]: 127.0.0.1 \(116.16.150.139\[116.16.150.139\]\) - USER anonymous: no such user found from 116.16.150.139 \[116.16.150.139\] to 37.187.78.186:21 Sep 30 22:58:07 ns3367391 proftpd\[22537\]: 127.0.0.1 \(116.16.150.139\[116.16.150.139\]\) - USER yourdailypornmovies: no such user found from 116.16.150.139 \[116.16.150.139\] to 37.187.78.186:21 ... |
2019-10-01 06:27:04 |
| 159.203.201.130 | attackbots | 09/30/2019-16:58:02.368052 159.203.201.130 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-01 06:32:51 |
| 222.186.175.217 | attackbots | Oct 1 05:34:41 itv-usvr-02 sshd[30987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217 user=root Oct 1 05:34:43 itv-usvr-02 sshd[30987]: Failed password for root from 222.186.175.217 port 37420 ssh2 |
2019-10-01 06:41:56 |
| 192.99.245.135 | attackbots | Sep 30 18:11:24 TORMINT sshd\[18738\]: Invalid user pork from 192.99.245.135 Sep 30 18:11:24 TORMINT sshd\[18738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.245.135 Sep 30 18:11:26 TORMINT sshd\[18738\]: Failed password for invalid user pork from 192.99.245.135 port 54914 ssh2 ... |
2019-10-01 06:24:20 |
| 177.69.213.236 | attackspambots | Oct 1 01:00:22 server sshd\[5625\]: Invalid user cb from 177.69.213.236 port 41870 Oct 1 01:00:22 server sshd\[5625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.213.236 Oct 1 01:00:25 server sshd\[5625\]: Failed password for invalid user cb from 177.69.213.236 port 41870 ssh2 Oct 1 01:04:50 server sshd\[10384\]: Invalid user plaza from 177.69.213.236 port 54200 Oct 1 01:04:50 server sshd\[10384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.213.236 |
2019-10-01 06:21:02 |