City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.57.167.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9927
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.57.167.31. IN A
;; AUTHORITY SECTION:
. 546 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022061501 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 16 02:42:43 CST 2022
;; MSG SIZE rcvd: 105
31.167.57.45.in-addr.arpa domain name pointer plane.teethods.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
31.167.57.45.in-addr.arpa name = plane.teethods.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 192.3.73.154 | attackbots | SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: 192-3-73-154-host.colocrossing.com. |
2020-09-07 01:55:07 |
| 41.217.46.91 | attack | Unauthorized connection attempt from IP address 41.217.46.91 on Port 445(SMB) |
2020-09-07 02:03:32 |
| 103.144.180.18 | attack | Lines containing failures of 103.144.180.18 Sep 3 08:34:00 kmh-vmh-001-fsn07 sshd[22376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.144.180.18 user=r.r Sep 3 08:34:02 kmh-vmh-001-fsn07 sshd[22376]: Failed password for r.r from 103.144.180.18 port 20461 ssh2 Sep 3 08:34:04 kmh-vmh-001-fsn07 sshd[22376]: Received disconnect from 103.144.180.18 port 20461:11: Bye Bye [preauth] Sep 3 08:34:04 kmh-vmh-001-fsn07 sshd[22376]: Disconnected from authenticating user r.r 103.144.180.18 port 20461 [preauth] Sep 3 08:48:08 kmh-vmh-001-fsn07 sshd[25905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.144.180.18 user=r.r Sep 3 08:48:10 kmh-vmh-001-fsn07 sshd[25905]: Failed password for r.r from 103.144.180.18 port 10685 ssh2 Sep 3 08:48:11 kmh-vmh-001-fsn07 sshd[25905]: Received disconnect from 103.144.180.18 port 10685:11: Bye Bye [preauth] Sep 3 08:48:11 kmh-vmh-001-fsn07 sshd[259........ ------------------------------ |
2020-09-07 01:44:02 |
| 192.35.169.20 | attack |
|
2020-09-07 02:16:20 |
| 139.155.81.79 | attack | 139.155.81.79 (CN/China/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 6 13:33:22 server5 sshd[19580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.146.9 user=root Sep 6 13:33:24 server5 sshd[19580]: Failed password for root from 106.12.146.9 port 56662 ssh2 Sep 6 13:39:02 server5 sshd[21978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.81.79 user=root Sep 6 13:39:04 server5 sshd[21993]: Failed password for root from 130.43.60.251 port 46498 ssh2 Sep 6 13:38:57 server5 sshd[21973]: Failed password for root from 62.94.193.216 port 33794 ssh2 IP Addresses Blocked: 106.12.146.9 (CN/China/-) |
2020-09-07 02:18:19 |
| 51.83.139.55 | attack | (sshd) Failed SSH login from 51.83.139.55 (PL/Poland/ip55.ip-51-83-139.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 6 14:06:40 optimus sshd[20615]: Failed password for root from 51.83.139.55 port 35345 ssh2 Sep 6 14:06:43 optimus sshd[20615]: Failed password for root from 51.83.139.55 port 35345 ssh2 Sep 6 14:06:45 optimus sshd[20615]: Failed password for root from 51.83.139.55 port 35345 ssh2 Sep 6 14:06:48 optimus sshd[20615]: Failed password for root from 51.83.139.55 port 35345 ssh2 Sep 6 14:06:51 optimus sshd[20615]: Failed password for root from 51.83.139.55 port 35345 ssh2 |
2020-09-07 02:08:44 |
| 106.12.252.212 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-09-07 02:03:13 |
| 94.231.218.223 | attack | failed attempts to access the website, searching for vulnerabilities, also using following IPs: 27.37.246.129 , 94.231.218.223 , 116.90.237.125 , 190.235.214.78 , 190.98.53.86 , 45.170.129.135 , 170.239.242.222 , 43.249.113.243 , 103.140.4.87 , 171.103.190.158 , 72.210.252.135 |
2020-09-07 01:47:43 |
| 5.188.84.228 | attackspam | 0,20-02/04 [bc01/m12] PostRequest-Spammer scoring: berlin |
2020-09-07 01:57:24 |
| 189.177.141.131 | attack | Honeypot attack, port: 81, PTR: dsl-189-177-141-131-dyn.prod-infinitum.com.mx. |
2020-09-07 02:19:49 |
| 175.98.161.130 | attackspam | Unauthorized connection attempt from IP address 175.98.161.130 on Port 445(SMB) |
2020-09-07 01:53:36 |
| 58.87.114.13 | attack | Sep 6 18:46:46 xeon sshd[29127]: Failed password for root from 58.87.114.13 port 60130 ssh2 |
2020-09-07 01:55:31 |
| 111.75.214.18 | attackspam | Unauthorized connection attempt from IP address 111.75.214.18 on Port 445(SMB) |
2020-09-07 02:01:33 |
| 218.92.0.246 | attackbots | $f2bV_matches |
2020-09-07 02:00:26 |
| 157.230.60.101 | attackspam |
|
2020-09-07 01:59:20 |