City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 30.204.164.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;30.204.164.220. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 13:08:14 CST 2025
;; MSG SIZE rcvd: 107
Host 220.164.204.30.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 220.164.204.30.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
139.99.89.91 | attack | Aug 5 16:01:42 abendstille sshd\[20037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.89.91 user=root Aug 5 16:01:45 abendstille sshd\[20037\]: Failed password for root from 139.99.89.91 port 47100 ssh2 Aug 5 16:06:27 abendstille sshd\[24215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.89.91 user=root Aug 5 16:06:29 abendstille sshd\[24215\]: Failed password for root from 139.99.89.91 port 59104 ssh2 Aug 5 16:11:06 abendstille sshd\[29007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.89.91 user=root ... |
2020-08-05 23:54:34 |
222.186.15.158 | attackspam | Aug 5 17:49:08 santamaria sshd\[14020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158 user=root Aug 5 17:49:11 santamaria sshd\[14020\]: Failed password for root from 222.186.15.158 port 34147 ssh2 Aug 5 17:49:18 santamaria sshd\[14022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158 user=root ... |
2020-08-05 23:49:50 |
101.96.113.50 | attackbotsspam | Banned for a week because repeated abuses, for example SSH, but not only |
2020-08-05 23:24:05 |
118.101.192.62 | attackspambots | Aug 5 15:15:28 ajax sshd[1490]: Failed password for root from 118.101.192.62 port 52015 ssh2 |
2020-08-05 23:50:41 |
51.15.242.165 | attackbots | Aug 5 14:50:08 [host] sshd[4763]: pam_unix(sshd:a Aug 5 14:50:10 [host] sshd[4763]: Failed password Aug 5 14:54:15 [host] sshd[4849]: pam_unix(sshd:a |
2020-08-05 23:14:21 |
79.54.18.135 | attackspambots | Aug 5 14:30:00 sticky sshd\[9793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.54.18.135 user=root Aug 5 14:30:02 sticky sshd\[9793\]: Failed password for root from 79.54.18.135 port 52492 ssh2 Aug 5 14:34:33 sticky sshd\[9847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.54.18.135 user=root Aug 5 14:34:35 sticky sshd\[9847\]: Failed password for root from 79.54.18.135 port 58301 ssh2 Aug 5 14:38:52 sticky sshd\[9861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.54.18.135 user=root |
2020-08-05 23:58:41 |
94.102.53.112 | attackbots | Aug 5 18:35:34 mertcangokgoz-v4-main kernel: [258676.546260] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:5a:6b:04:d2:74:7f:6e:37:e3:08:00 SRC=94.102.53.112 DST=94.130.96.165 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=5001 PROTO=TCP SPT=44873 DPT=14540 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-08-05 23:44:40 |
157.230.151.241 | attack | Aug 5 12:30:28 vlre-nyc-1 sshd\[17516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.151.241 user=root Aug 5 12:30:30 vlre-nyc-1 sshd\[17516\]: Failed password for root from 157.230.151.241 port 35494 ssh2 Aug 5 12:34:38 vlre-nyc-1 sshd\[17584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.151.241 user=root Aug 5 12:34:39 vlre-nyc-1 sshd\[17584\]: Failed password for root from 157.230.151.241 port 47836 ssh2 Aug 5 12:38:32 vlre-nyc-1 sshd\[17638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.151.241 user=root ... |
2020-08-05 23:35:53 |
186.94.45.157 | attackspam | Unauthorized connection attempt from IP address 186.94.45.157 on Port 445(SMB) |
2020-08-05 23:51:44 |
35.199.73.100 | attack | Aug 5 16:26:11 prox sshd[22253]: Failed password for root from 35.199.73.100 port 58790 ssh2 |
2020-08-05 23:53:05 |
206.189.154.38 | attackspambots | Port scan: Attack repeated for 24 hours |
2020-08-05 23:25:04 |
111.229.253.8 | attackspambots | Aug 5 14:13:03 haigwepa sshd[425]: Failed password for root from 111.229.253.8 port 41254 ssh2 ... |
2020-08-05 23:27:23 |
195.54.160.180 | attackbotsspam | 2020-08-05T10:52:20.3422271495-001 sshd[32341]: Invalid user admin from 195.54.160.180 port 36103 2020-08-05T10:52:22.2601911495-001 sshd[32341]: Failed password for invalid user admin from 195.54.160.180 port 36103 ssh2 2020-08-05T10:52:23.4224641495-001 sshd[32343]: Invalid user alain from 195.54.160.180 port 40925 2020-08-05T10:52:23.5609851495-001 sshd[32343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.180 2020-08-05T10:52:23.4224641495-001 sshd[32343]: Invalid user alain from 195.54.160.180 port 40925 2020-08-05T10:52:26.0900401495-001 sshd[32343]: Failed password for invalid user alain from 195.54.160.180 port 40925 ssh2 ... |
2020-08-05 23:16:45 |
117.6.133.148 | attack | 1596629818 - 08/05/2020 14:16:58 Host: 117.6.133.148/117.6.133.148 Port: 445 TCP Blocked |
2020-08-05 23:34:01 |
139.59.93.93 | attack | Aug 5 10:39:44 firewall sshd[6540]: Failed password for root from 139.59.93.93 port 58212 ssh2 Aug 5 10:44:26 firewall sshd[6796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.93.93 user=root Aug 5 10:44:27 firewall sshd[6796]: Failed password for root from 139.59.93.93 port 39008 ssh2 ... |
2020-08-06 00:01:14 |