City: Frankfurt am Main
Region: Hessen
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.72.163.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12181
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;3.72.163.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:51:21 CST 2025
;; MSG SIZE rcvd: 104
42.163.72.3.in-addr.arpa domain name pointer ec2-3-72-163-42.eu-central-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.163.72.3.in-addr.arpa name = ec2-3-72-163-42.eu-central-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 165.227.77.120 | attack | Dec 16 01:01:03 eventyay sshd[13455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.77.120 Dec 16 01:01:06 eventyay sshd[13455]: Failed password for invalid user plese from 165.227.77.120 port 41668 ssh2 Dec 16 01:06:05 eventyay sshd[13574]: Failed password for root from 165.227.77.120 port 45517 ssh2 ... |
2019-12-16 08:13:07 |
| 103.111.86.241 | attackbots | SSH brute-force: detected 8 distinct usernames within a 24-hour window. |
2019-12-16 08:10:41 |
| 167.99.155.36 | attackspambots | Dec 16 01:49:21 hosting sshd[1268]: Invalid user torulf from 167.99.155.36 port 50584 ... |
2019-12-16 07:34:43 |
| 180.106.81.168 | attackspambots | 2019-12-15T17:46:24.915432homeassistant sshd[20929]: Failed password for invalid user sheryl from 180.106.81.168 port 34066 ssh2 2019-12-15T22:49:05.861682homeassistant sshd[28377]: Invalid user furlin from 180.106.81.168 port 35026 2019-12-15T22:49:05.868580homeassistant sshd[28377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.106.81.168 ... |
2019-12-16 07:58:20 |
| 92.118.38.56 | attack | SASL PLAIN auth failed: ruser=... |
2019-12-16 07:48:59 |
| 51.38.175.197 | attackspam | Dec 16 01:05:11 ns381471 sshd[11510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.175.197 Dec 16 01:05:13 ns381471 sshd[11510]: Failed password for invalid user isaachsen from 51.38.175.197 port 44616 ssh2 |
2019-12-16 08:08:13 |
| 163.44.153.232 | attack | Dec 16 00:47:57 vps691689 sshd[31324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.153.232 Dec 16 00:47:59 vps691689 sshd[31324]: Failed password for invalid user leilani from 163.44.153.232 port 42192 ssh2 ... |
2019-12-16 08:03:46 |
| 129.144.60.201 | attackspambots | Dec 16 00:29:59 minden010 sshd[3137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.144.60.201 Dec 16 00:30:01 minden010 sshd[3137]: Failed password for invalid user dowers from 129.144.60.201 port 31967 ssh2 Dec 16 00:37:03 minden010 sshd[8062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.144.60.201 ... |
2019-12-16 07:41:52 |
| 121.145.31.123 | attack | 2323/tcp 23/tcp... [2019-10-26/12-15]4pkt,2pt.(tcp) |
2019-12-16 07:55:32 |
| 177.103.254.24 | attackbotsspam | Dec 15 13:34:04 tdfoods sshd\[9045\]: Invalid user tomato from 177.103.254.24 Dec 15 13:34:04 tdfoods sshd\[9045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.254.24 Dec 15 13:34:06 tdfoods sshd\[9045\]: Failed password for invalid user tomato from 177.103.254.24 port 55514 ssh2 Dec 15 13:40:33 tdfoods sshd\[9710\]: Invalid user info from 177.103.254.24 Dec 15 13:40:34 tdfoods sshd\[9710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.254.24 |
2019-12-16 07:41:29 |
| 222.186.175.161 | attackbots | Dec 16 00:34:17 h2177944 sshd\[18958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.161 user=root Dec 16 00:34:20 h2177944 sshd\[18958\]: Failed password for root from 222.186.175.161 port 1208 ssh2 Dec 16 00:34:23 h2177944 sshd\[18958\]: Failed password for root from 222.186.175.161 port 1208 ssh2 Dec 16 00:34:26 h2177944 sshd\[18958\]: Failed password for root from 222.186.175.161 port 1208 ssh2 ... |
2019-12-16 07:36:08 |
| 222.186.3.249 | attackspambots | Dec 16 00:56:30 OPSO sshd\[24011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.3.249 user=root Dec 16 00:56:32 OPSO sshd\[24011\]: Failed password for root from 222.186.3.249 port 18279 ssh2 Dec 16 00:56:34 OPSO sshd\[24011\]: Failed password for root from 222.186.3.249 port 18279 ssh2 Dec 16 00:56:36 OPSO sshd\[24011\]: Failed password for root from 222.186.3.249 port 18279 ssh2 Dec 16 00:58:25 OPSO sshd\[24326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.3.249 user=root |
2019-12-16 08:06:24 |
| 54.36.148.10 | attackspam | www noscript ... |
2019-12-16 08:07:50 |
| 118.24.114.205 | attack | Dec 16 05:49:09 itv-usvr-01 sshd[16854]: Invalid user rc from 118.24.114.205 Dec 16 05:49:09 itv-usvr-01 sshd[16854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.114.205 Dec 16 05:49:09 itv-usvr-01 sshd[16854]: Invalid user rc from 118.24.114.205 Dec 16 05:49:10 itv-usvr-01 sshd[16854]: Failed password for invalid user rc from 118.24.114.205 port 35532 ssh2 |
2019-12-16 07:52:02 |
| 45.119.82.251 | attackspam | web-1 [ssh_2] SSH Attack |
2019-12-16 08:04:58 |