City: unknown
Region: unknown
Country: Viet Nam
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.66.172.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27030
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;27.66.172.20. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 03:20:53 CST 2025
;; MSG SIZE rcvd: 105
20.172.66.27.in-addr.arpa domain name pointer localhost.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
20.172.66.27.in-addr.arpa name = localhost.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 150.109.190.72 | attackspambots | ICMP MH Probe, Scan /Distributed - |
2020-02-08 05:51:47 |
| 138.97.31.81 | attackspambots | Port probing on unauthorized port 23 |
2020-02-08 05:47:44 |
| 149.129.128.130 | attackbots | ICMP MH Probe, Scan /Distributed - |
2020-02-08 06:02:16 |
| 80.64.105.131 | attackspam | Unauthorized connection attempt from IP address 80.64.105.131 on Port 445(SMB) |
2020-02-08 05:32:05 |
| 145.239.87.109 | attackspam | fraudulent SSH attempt |
2020-02-08 05:59:00 |
| 106.12.12.242 | attackbotsspam | 2020-02-07T16:27:32.419219scmdmz1 sshd[13363]: Invalid user nyj from 106.12.12.242 port 45498 2020-02-07T16:27:32.423205scmdmz1 sshd[13363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.242 2020-02-07T16:27:32.419219scmdmz1 sshd[13363]: Invalid user nyj from 106.12.12.242 port 45498 2020-02-07T16:27:34.078087scmdmz1 sshd[13363]: Failed password for invalid user nyj from 106.12.12.242 port 45498 ssh2 2020-02-07T16:31:54.271778scmdmz1 sshd[14125]: Invalid user ljw from 106.12.12.242 port 40602 ... |
2020-02-08 05:46:15 |
| 148.245.13.21 | attackspambots | 2020-02-07T11:19:53.424796-07:00 suse-nuc sshd[20866]: Invalid user hqs from 148.245.13.21 port 46540 ... |
2020-02-08 05:31:40 |
| 95.156.116.198 | attackspambots | Unauthorized connection attempt from IP address 95.156.116.198 on Port 445(SMB) |
2020-02-08 05:54:23 |
| 118.25.108.121 | attackbotsspam | Feb 7 20:03:55 www sshd[30595]: Invalid user ipl from 118.25.108.121 Feb 7 20:03:56 www sshd[30595]: Failed password for invalid user ipl from 118.25.108.121 port 49014 ssh2 Feb 7 20:08:54 www sshd[30769]: Invalid user dym from 118.25.108.121 Feb 7 20:08:56 www sshd[30769]: Failed password for invalid user dym from 118.25.108.121 port 45342 ssh2 Feb 7 20:09:46 www sshd[30810]: Invalid user ngm from 118.25.108.121 Feb 7 20:09:48 www sshd[30810]: Failed password for invalid user ngm from 118.25.108.121 port 50498 ssh2 Feb 7 20:10:45 www sshd[30898]: Invalid user tvb from 118.25.108.121 Feb 7 20:10:47 www sshd[30898]: Failed password for invalid user tvb from 118.25.108.121 port 55666 ssh2 Feb 7 20:11:35 www sshd[30908]: Invalid user yvw from 118.25.108.121 Feb 7 20:11:37 www sshd[30908]: Failed password for invalid user yvw from 118.25.108.121 port 60826 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=118.25.108.121 |
2020-02-08 06:10:11 |
| 145.100.118.1 | attackspambots | ICMP MH Probe, Scan /Distributed - |
2020-02-08 06:12:42 |
| 103.89.91.156 | attackbotsspam | Unauthorized connection attempt detected from IP address 103.89.91.156 to port 3389 |
2020-02-08 05:53:42 |
| 106.13.68.16 | attackspambots | Feb 7 15:57:50 localhost sshd\[22889\]: Invalid user xrl from 106.13.68.16 port 41928 Feb 7 15:57:50 localhost sshd\[22889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.68.16 Feb 7 15:57:52 localhost sshd\[22889\]: Failed password for invalid user xrl from 106.13.68.16 port 41928 ssh2 |
2020-02-08 06:09:26 |
| 61.231.64.211 | attackspambots | Lines containing failures of 61.231.64.211 Feb 5 20:27:26 ariston sshd[10626]: Invalid user lj from 61.231.64.211 port 58448 Feb 5 20:27:26 ariston sshd[10626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.231.64.211 Feb 5 20:27:28 ariston sshd[10626]: Failed password for invalid user lj from 61.231.64.211 port 58448 ssh2 Feb 5 20:27:29 ariston sshd[10626]: Received disconnect from 61.231.64.211 port 58448:11: Bye Bye [preauth] Feb 5 20:27:29 ariston sshd[10626]: Disconnected from invalid user lj 61.231.64.211 port 58448 [preauth] Feb 5 20:30:48 ariston sshd[11077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.231.64.211 user=r.r Feb 5 20:30:51 ariston sshd[11077]: Failed password for r.r from 61.231.64.211 port 34594 ssh2 Feb 5 20:30:53 ariston sshd[11077]: Received disconnect from 61.231.64.211 port 34594:11: Bye Bye [preauth] Feb 5 20:30:53 ariston sshd[11077]: Discon........ ------------------------------ |
2020-02-08 06:06:14 |
| 144.217.85.55 | attack | fraudulent SSH attempt |
2020-02-08 06:11:54 |
| 222.186.30.209 | attack | Feb 7 22:40:41 cvbnet sshd[29418]: Failed password for root from 222.186.30.209 port 64634 ssh2 Feb 7 22:40:43 cvbnet sshd[29418]: Failed password for root from 222.186.30.209 port 64634 ssh2 ... |
2020-02-08 05:42:17 |