City: unknown
Region: unknown
Country: Czechia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.102.53.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48824
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.102.53.39. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031303 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 14 05:16:31 CST 2025
;; MSG SIZE rcvd: 104
39.53.102.5.in-addr.arpa domain name pointer 39.53.102.5.client.nordic.tel.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
39.53.102.5.in-addr.arpa name = 39.53.102.5.client.nordic.tel.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 59.36.142.180 | attackbots | Apr 26 19:50:57 ns381471 sshd[17753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.36.142.180 Apr 26 19:50:59 ns381471 sshd[17753]: Failed password for invalid user jd from 59.36.142.180 port 50122 ssh2 |
2020-04-27 03:23:41 |
| 181.30.8.146 | attackbots | Repeated brute force against a port |
2020-04-27 03:33:56 |
| 142.93.202.159 | attack | Apr 26 15:31:03 scw-6657dc sshd[3646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.202.159 Apr 26 15:31:03 scw-6657dc sshd[3646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.202.159 Apr 26 15:31:04 scw-6657dc sshd[3646]: Failed password for invalid user dev from 142.93.202.159 port 40768 ssh2 ... |
2020-04-27 03:07:35 |
| 138.197.222.141 | attackspam | Apr 26 17:36:22 odroid64 sshd\[31236\]: Invalid user maxreg from 138.197.222.141 Apr 26 17:36:22 odroid64 sshd\[31236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.222.141 ... |
2020-04-27 03:08:20 |
| 51.178.28.196 | attackbotsspam | 2020-04-26T09:21:02.1089081495-001 sshd[48494]: Failed password for invalid user cib from 51.178.28.196 port 46044 ssh2 2020-04-26T09:25:02.6971511495-001 sshd[48695]: Invalid user mateusz from 51.178.28.196 port 57888 2020-04-26T09:25:02.7045121495-001 sshd[48695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.ip-51-178-28.eu 2020-04-26T09:25:02.6971511495-001 sshd[48695]: Invalid user mateusz from 51.178.28.196 port 57888 2020-04-26T09:25:04.7783141495-001 sshd[48695]: Failed password for invalid user mateusz from 51.178.28.196 port 57888 ssh2 2020-04-26T09:29:09.7779341495-001 sshd[48894]: Invalid user credit from 51.178.28.196 port 41502 ... |
2020-04-27 02:57:38 |
| 73.229.232.218 | attack | Invalid user zc |
2020-04-27 03:21:48 |
| 45.157.232.128 | attackspam | Lines containing failures of 45.157.232.128 Apr 26 20:33:59 mailserver sshd[17087]: Invalid user soporte from 45.157.232.128 port 47948 Apr 26 20:33:59 mailserver sshd[17087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.157.232.128 Apr 26 20:34:01 mailserver sshd[17087]: Failed password for invalid user soporte from 45.157.232.128 port 47948 ssh2 Apr 26 20:34:01 mailserver sshd[17087]: Received disconnect from 45.157.232.128 port 47948:11: Bye Bye [preauth] Apr 26 20:34:01 mailserver sshd[17087]: Disconnected from invalid user soporte 45.157.232.128 port 47948 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=45.157.232.128 |
2020-04-27 03:24:31 |
| 42.101.43.186 | attackbots | 2020-04-26T14:17:10.5372531495-001 sshd[63923]: Failed password for root from 42.101.43.186 port 56820 ssh2 2020-04-26T14:23:41.5660861495-001 sshd[64386]: Invalid user marketing from 42.101.43.186 port 59436 2020-04-26T14:23:41.5734031495-001 sshd[64386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.101.43.186 2020-04-26T14:23:41.5660861495-001 sshd[64386]: Invalid user marketing from 42.101.43.186 port 59436 2020-04-26T14:23:43.1684561495-001 sshd[64386]: Failed password for invalid user marketing from 42.101.43.186 port 59436 ssh2 2020-04-26T14:27:07.4239001495-001 sshd[64561]: Invalid user dl from 42.101.43.186 port 33660 ... |
2020-04-27 03:25:10 |
| 27.71.227.197 | attackbotsspam | Apr 26 20:59:40 vpn01 sshd[19180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.227.197 Apr 26 20:59:42 vpn01 sshd[19180]: Failed password for invalid user wpms from 27.71.227.197 port 52324 ssh2 ... |
2020-04-27 03:25:41 |
| 62.171.154.89 | attackspam | Apr 26 21:02:56 xeon sshd[34232]: Failed password for invalid user chiudi from 62.171.154.89 port 54026 ssh2 |
2020-04-27 03:23:19 |
| 219.144.68.15 | attackspambots | Invalid user jira from 219.144.68.15 port 41250 |
2020-04-27 03:01:04 |
| 181.52.249.213 | attackspam | Apr 26 21:28:32 ift sshd\[2591\]: Invalid user juliana from 181.52.249.213Apr 26 21:28:33 ift sshd\[2591\]: Failed password for invalid user juliana from 181.52.249.213 port 49540 ssh2Apr 26 21:32:07 ift sshd\[3106\]: Invalid user app from 181.52.249.213Apr 26 21:32:09 ift sshd\[3106\]: Failed password for invalid user app from 181.52.249.213 port 52688 ssh2Apr 26 21:35:55 ift sshd\[3679\]: Failed password for root from 181.52.249.213 port 55826 ssh2 ... |
2020-04-27 03:33:42 |
| 187.188.90.141 | attack | Apr 26 16:50:58 sshgateway sshd\[11024\]: Invalid user pdf from 187.188.90.141 Apr 26 16:50:58 sshgateway sshd\[11024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-188-90-141.totalplay.net Apr 26 16:51:01 sshgateway sshd\[11024\]: Failed password for invalid user pdf from 187.188.90.141 port 58592 ssh2 |
2020-04-27 03:31:26 |
| 177.67.240.217 | attackspambots | Apr 26 18:50:28 ws25vmsma01 sshd[207210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.67.240.217 Apr 26 18:50:30 ws25vmsma01 sshd[207210]: Failed password for invalid user dls from 177.67.240.217 port 53821 ssh2 ... |
2020-04-27 03:04:39 |
| 111.229.102.53 | attack | Apr 26 18:59:43 sshgateway sshd\[11614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.102.53 user=root Apr 26 18:59:45 sshgateway sshd\[11614\]: Failed password for root from 111.229.102.53 port 27920 ssh2 Apr 26 19:05:09 sshgateway sshd\[11630\]: Invalid user yz from 111.229.102.53 |
2020-04-27 03:14:28 |