City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.99.170.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6903
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;4.99.170.104. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 20:15:52 CST 2025
;; MSG SIZE rcvd: 105
Host 104.170.99.4.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 104.170.99.4.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 139.5.104.235 | attack | Unauthorized connection attempt from IP address 139.5.104.235 on Port 445(SMB) |
2020-05-23 23:18:32 |
| 103.245.71.137 | attackbotsspam | Unauthorized connection attempt from IP address 103.245.71.137 on Port 445(SMB) |
2020-05-23 22:51:52 |
| 222.186.190.2 | attackbots | May 23 11:07:23 NPSTNNYC01T sshd[28628]: Failed password for root from 222.186.190.2 port 31704 ssh2 May 23 11:07:36 NPSTNNYC01T sshd[28628]: error: maximum authentication attempts exceeded for root from 222.186.190.2 port 31704 ssh2 [preauth] May 23 11:07:43 NPSTNNYC01T sshd[28684]: Failed password for root from 222.186.190.2 port 46318 ssh2 ... |
2020-05-23 23:09:14 |
| 165.22.28.19 | attack | Automatic report - Port Scan |
2020-05-23 22:51:13 |
| 180.242.223.91 | attackspambots | Unauthorized connection attempt from IP address 180.242.223.91 on Port 445(SMB) |
2020-05-23 22:55:37 |
| 49.235.100.58 | attackspam | May 23 13:42:26 game-panel sshd[14900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.100.58 May 23 13:42:28 game-panel sshd[14900]: Failed password for invalid user pge from 49.235.100.58 port 38382 ssh2 May 23 13:44:40 game-panel sshd[15029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.100.58 |
2020-05-23 22:38:55 |
| 184.105.139.112 | attackspam | " " |
2020-05-23 22:44:10 |
| 89.129.17.5 | attackbotsspam | (sshd) Failed SSH login from 89.129.17.5 (ES/Spain/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 23 14:01:04 ubnt-55d23 sshd[30899]: Invalid user lcb from 89.129.17.5 port 51224 May 23 14:01:06 ubnt-55d23 sshd[30899]: Failed password for invalid user lcb from 89.129.17.5 port 51224 ssh2 |
2020-05-23 22:47:46 |
| 186.95.239.62 | attackbotsspam | Unauthorized connection attempt from IP address 186.95.239.62 on Port 445(SMB) |
2020-05-23 23:05:32 |
| 54.37.136.87 | attackspam | bruteforce detected |
2020-05-23 23:14:20 |
| 95.167.225.81 | attackspambots | May 23 15:21:51 legacy sshd[29903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.225.81 May 23 15:21:53 legacy sshd[29903]: Failed password for invalid user lmx from 95.167.225.81 port 40966 ssh2 May 23 15:27:42 legacy sshd[30174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.225.81 ... |
2020-05-23 22:56:47 |
| 106.13.185.97 | attackspambots | May 23 08:24:44 server1 sshd\[22072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.185.97 May 23 08:24:46 server1 sshd\[22072\]: Failed password for invalid user hrs from 106.13.185.97 port 50892 ssh2 May 23 08:28:31 server1 sshd\[23084\]: Invalid user aha from 106.13.185.97 May 23 08:28:31 server1 sshd\[23084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.185.97 May 23 08:28:33 server1 sshd\[23084\]: Failed password for invalid user aha from 106.13.185.97 port 33040 ssh2 ... |
2020-05-23 23:09:29 |
| 122.155.223.58 | attack | 2020-05-23T07:40:39.7800871495-001 sshd[48815]: Invalid user zmq from 122.155.223.58 port 58290 2020-05-23T07:40:42.4285811495-001 sshd[48815]: Failed password for invalid user zmq from 122.155.223.58 port 58290 ssh2 2020-05-23T07:42:46.9805381495-001 sshd[48882]: Invalid user qrn from 122.155.223.58 port 47468 2020-05-23T07:42:46.9874791495-001 sshd[48882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.223.58 2020-05-23T07:42:46.9805381495-001 sshd[48882]: Invalid user qrn from 122.155.223.58 port 47468 2020-05-23T07:42:49.7295051495-001 sshd[48882]: Failed password for invalid user qrn from 122.155.223.58 port 47468 ssh2 ... |
2020-05-23 22:51:27 |
| 218.92.0.145 | attack | May 23 16:41:35 vmd48417 sshd[30427]: Failed password for root from 218.92.0.145 port 23899 ssh2 |
2020-05-23 22:45:03 |
| 181.48.248.125 | attack | Unauthorized connection attempt from IP address 181.48.248.125 on Port 445(SMB) |
2020-05-23 22:53:07 |