City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: Microsoft Corporation
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.99.18.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58728
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;40.99.18.55. IN A
;; AUTHORITY SECTION:
. 663 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019081100 1800 900 604800 86400
;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 12 02:42:00 CST 2019
;; MSG SIZE rcvd: 115
Host 55.18.99.40.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 55.18.99.40.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 192.99.245.147 | attack | 2020-04-04T21:32:21.601164struts4.enskede.local sshd\[20841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.ip-192-99-245.net user=root 2020-04-04T21:32:24.298874struts4.enskede.local sshd\[20841\]: Failed password for root from 192.99.245.147 port 36084 ssh2 2020-04-04T21:36:34.019556struts4.enskede.local sshd\[21012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.ip-192-99-245.net user=root 2020-04-04T21:36:36.736808struts4.enskede.local sshd\[21012\]: Failed password for root from 192.99.245.147 port 35806 ssh2 2020-04-04T21:40:34.249392struts4.enskede.local sshd\[21153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.ip-192-99-245.net user=root ... |
2020-04-05 03:42:36 |
| 106.12.69.53 | attackbotsspam | Apr 4 09:31:43 lanister sshd[10886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.69.53 user=root Apr 4 09:31:45 lanister sshd[10886]: Failed password for root from 106.12.69.53 port 48206 ssh2 Apr 4 09:35:30 lanister sshd[10966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.69.53 user=root Apr 4 09:35:31 lanister sshd[10966]: Failed password for root from 106.12.69.53 port 60354 ssh2 |
2020-04-05 03:52:17 |
| 162.243.133.219 | attackspambots | 5984/tcp 44818/tcp 50070/tcp... [2020-03-17/04-04]16pkt,15pt.(tcp) |
2020-04-05 03:52:59 |
| 80.24.111.17 | attackspambots | Apr 4 18:30:32 ourumov-web sshd\[19016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.24.111.17 user=root Apr 4 18:30:34 ourumov-web sshd\[19016\]: Failed password for root from 80.24.111.17 port 59598 ssh2 Apr 4 18:37:59 ourumov-web sshd\[19531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.24.111.17 user=root ... |
2020-04-05 04:12:03 |
| 104.236.250.155 | attack | Apr 4 20:02:29 odroid64 sshd\[6519\]: User root from 104.236.250.155 not allowed because not listed in AllowUsers Apr 4 20:02:29 odroid64 sshd\[6519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.250.155 user=root ... |
2020-04-05 03:47:20 |
| 119.82.224.75 | attack | Microsoft SQL Server User Authentication Brute Force Attempt, PTR: ip-host.224.75. |
2020-04-05 03:38:50 |
| 46.190.52.132 | attackspam | 20/4/4@09:35:19: FAIL: Alarm-Telnet address from=46.190.52.132 20/4/4@09:35:20: FAIL: Alarm-Telnet address from=46.190.52.132 ... |
2020-04-05 04:07:53 |
| 110.49.142.46 | attackspambots | 2020-04-04T16:25:15.410680shield sshd\[16738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.142.46 user=root 2020-04-04T16:25:17.409721shield sshd\[16738\]: Failed password for root from 110.49.142.46 port 52266 ssh2 2020-04-04T16:29:46.790886shield sshd\[17256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.142.46 user=root 2020-04-04T16:29:48.659590shield sshd\[17256\]: Failed password for root from 110.49.142.46 port 50044 ssh2 2020-04-04T16:34:09.465431shield sshd\[17826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.142.46 user=root |
2020-04-05 04:15:00 |
| 90.190.201.241 | attackspambots | Unauthorized connection attempt detected from IP address 90.190.201.241 to port 22 |
2020-04-05 04:20:36 |
| 218.158.126.72 | attackspambots | 23/tcp 23/tcp [2020-03-16/04-04]2pkt |
2020-04-05 03:59:52 |
| 194.26.29.113 | attackbotsspam | Apr 4 21:38:23 debian-2gb-nbg1-2 kernel: \[8288136.605410\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.113 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=41604 PROTO=TCP SPT=52123 DPT=424 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-04-05 03:41:17 |
| 91.201.246.215 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 04-04-2020 14:35:16. |
2020-04-05 04:11:17 |
| 210.96.48.228 | attackspambots | Lines containing failures of 210.96.48.228 Apr 3 20:35:57 www sshd[8823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.96.48.228 user=r.r Apr 3 20:35:59 www sshd[8823]: Failed password for r.r from 210.96.48.228 port 46862 ssh2 Apr 3 20:35:59 www sshd[8823]: Received disconnect from 210.96.48.228 port 46862:11: Bye Bye [preauth] Apr 3 20:35:59 www sshd[8823]: Disconnected from authenticating user r.r 210.96.48.228 port 46862 [preauth] Apr 3 20:37:37 www sshd[9019]: Invalid user nh from 210.96.48.228 port 38300 Apr 3 20:37:37 www sshd[9019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.96.48.228 Apr 3 20:37:39 www sshd[9019]: Failed password for invalid user nh from 210.96.48.228 port 38300 ssh2 Apr 3 20:37:39 www sshd[9019]: Received disconnect from 210.96.48.228 port 38300:11: Bye Bye [preauth] Apr 3 20:37:39 www sshd[9019]: Disconnected from invalid user nh 210.96.48........ ------------------------------ |
2020-04-05 03:40:34 |
| 172.245.241.76 | attackspam | Apr 4 21:41:27 srv01 sshd[32535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.245.241.76 user=root Apr 4 21:41:29 srv01 sshd[32535]: Failed password for root from 172.245.241.76 port 39424 ssh2 Apr 4 21:44:22 srv01 sshd[335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.245.241.76 user=root Apr 4 21:44:25 srv01 sshd[335]: Failed password for root from 172.245.241.76 port 47924 ssh2 Apr 4 21:47:19 srv01 sshd[509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.245.241.76 user=root Apr 4 21:47:21 srv01 sshd[509]: Failed password for root from 172.245.241.76 port 56442 ssh2 ... |
2020-04-05 03:52:38 |
| 222.186.169.194 | attack | 2020-04-04T21:48:01.693177vps773228.ovh.net sshd[15575]: Failed password for root from 222.186.169.194 port 24180 ssh2 2020-04-04T21:48:04.905247vps773228.ovh.net sshd[15575]: Failed password for root from 222.186.169.194 port 24180 ssh2 2020-04-04T21:48:07.667703vps773228.ovh.net sshd[15575]: Failed password for root from 222.186.169.194 port 24180 ssh2 2020-04-04T21:48:11.037199vps773228.ovh.net sshd[15575]: Failed password for root from 222.186.169.194 port 24180 ssh2 2020-04-04T21:48:14.291935vps773228.ovh.net sshd[15575]: Failed password for root from 222.186.169.194 port 24180 ssh2 ... |
2020-04-05 03:48:41 |