City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 33.129.136.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26981
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;33.129.136.92. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 09:53:38 CST 2025
;; MSG SIZE rcvd: 106
Host 92.136.129.33.in-addr.arpa not found: 2(SERVFAIL)
server can't find 33.129.136.92.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 211.106.172.50 | attackbots | Jun 24 21:49:05 xb0 sshd[12836]: Failed password for invalid user ai from 211.106.172.50 port 52342 ssh2 Jun 24 21:49:05 xb0 sshd[12836]: Received disconnect from 211.106.172.50: 11: Bye Bye [preauth] Jun 24 21:52:08 xb0 sshd[8019]: Failed password for invalid user svk from 211.106.172.50 port 54554 ssh2 Jun 24 21:52:08 xb0 sshd[8019]: Received disconnect from 211.106.172.50: 11: Bye Bye [preauth] Jun 24 21:53:54 xb0 sshd[11177]: Failed password for invalid user teamspeak3 from 211.106.172.50 port 43780 ssh2 Jun 24 21:53:54 xb0 sshd[11177]: Received disconnect from 211.106.172.50: 11: Bye Bye [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=211.106.172.50 |
2019-06-30 00:38:16 |
| 14.63.167.192 | attack | Jun 29 14:20:37 ns41 sshd[14747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.167.192 Jun 29 14:20:37 ns41 sshd[14747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.167.192 |
2019-06-30 00:20:56 |
| 153.92.5.4 | attack | Jun 29 14:50:52 localhost sshd\[22473\]: Invalid user pw from 153.92.5.4 port 40650 Jun 29 14:50:52 localhost sshd\[22473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.92.5.4 ... |
2019-06-30 00:15:31 |
| 45.79.106.170 | attackbotsspam | " " |
2019-06-30 00:10:04 |
| 159.224.177.236 | attackspam | Jun 29 12:35:22 vps200512 sshd\[19365\]: Invalid user oscar from 159.224.177.236 Jun 29 12:35:22 vps200512 sshd\[19365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.224.177.236 Jun 29 12:35:25 vps200512 sshd\[19365\]: Failed password for invalid user oscar from 159.224.177.236 port 35982 ssh2 Jun 29 12:37:06 vps200512 sshd\[19404\]: Invalid user teamspeak3 from 159.224.177.236 Jun 29 12:37:06 vps200512 sshd\[19404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.224.177.236 |
2019-06-30 00:42:24 |
| 41.89.160.50 | attackspam | Jun 29 16:41:50 ovpn sshd\[14243\]: Invalid user oracle from 41.89.160.50 Jun 29 16:41:50 ovpn sshd\[14243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.89.160.50 Jun 29 16:41:53 ovpn sshd\[14243\]: Failed password for invalid user oracle from 41.89.160.50 port 49560 ssh2 Jun 29 16:45:17 ovpn sshd\[14861\]: Invalid user web1 from 41.89.160.50 Jun 29 16:45:17 ovpn sshd\[14861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.89.160.50 |
2019-06-30 00:23:18 |
| 121.186.14.44 | attackspam | Triggered by Fail2Ban at Ares web server |
2019-06-30 00:13:53 |
| 51.254.164.230 | attackspambots | Jun 29 18:46:52 SilenceServices sshd[1360]: Failed password for root from 51.254.164.230 port 52582 ssh2 Jun 29 18:47:40 SilenceServices sshd[1798]: Failed password for root from 51.254.164.230 port 51236 ssh2 |
2019-06-30 00:53:00 |
| 188.165.242.200 | attackbots | Jun 29 17:33:05 [host] sshd[17393]: Invalid user nasa from 188.165.242.200 Jun 29 17:33:05 [host] sshd[17393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.242.200 Jun 29 17:33:07 [host] sshd[17393]: Failed password for invalid user nasa from 188.165.242.200 port 53922 ssh2 |
2019-06-30 00:21:44 |
| 39.41.60.2 | attackbotsspam | Autoban 39.41.60.2 AUTH/CONNECT |
2019-06-30 00:49:59 |
| 52.172.44.97 | attackspambots | Jun 24 21:49:57 web1 sshd[31149]: Invalid user oracle from 52.172.44.97 Jun 24 21:49:57 web1 sshd[31149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.44.97 Jun 24 21:49:59 web1 sshd[31149]: Failed password for invalid user oracle from 52.172.44.97 port 38510 ssh2 Jun 24 21:49:59 web1 sshd[31149]: Received disconnect from 52.172.44.97: 11: Bye Bye [preauth] Jun 24 21:53:23 web1 sshd[31512]: Invalid user zhou from 52.172.44.97 Jun 24 21:53:23 web1 sshd[31512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.44.97 Jun 24 21:53:24 web1 sshd[31512]: Failed password for invalid user zhou from 52.172.44.97 port 48768 ssh2 Jun 24 21:53:24 web1 sshd[31512]: Received disconnect from 52.172.44.97: 11: Bye Bye [preauth] Jun 24 21:55:10 web1 sshd[31910]: Invalid user pick from 52.172.44.97 Jun 24 21:55:10 web1 sshd[31910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu........ ------------------------------- |
2019-06-30 00:56:07 |
| 220.153.52.181 | attackspambots | 2019-06-29T17:39:54.302254 sshd[28735]: Invalid user airadmin from 220.153.52.181 port 51772 2019-06-29T17:39:54.318577 sshd[28735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.153.52.181 2019-06-29T17:39:54.302254 sshd[28735]: Invalid user airadmin from 220.153.52.181 port 51772 2019-06-29T17:39:56.181869 sshd[28735]: Failed password for invalid user airadmin from 220.153.52.181 port 51772 ssh2 2019-06-29T17:42:32.494032 sshd[28751]: Invalid user webApp from 220.153.52.181 port 34026 ... |
2019-06-30 00:29:02 |
| 80.82.77.33 | attackbotsspam | 29.06.2019 16:19:54 Connection to port 4800 blocked by firewall |
2019-06-30 00:35:13 |
| 198.20.70.114 | attack | Port scan: Attack repeated for 24 hours |
2019-06-30 00:12:28 |
| 72.135.232.190 | attackspambots | Autoban 72.135.232.190 AUTH/CONNECT |
2019-06-30 00:02:27 |