City: Murray Bridge
Region: South Australia
Country: Australia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.253.23.37
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31046
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.253.23.37. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025040701 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 08 03:39:25 CST 2025
;; MSG SIZE rcvd: 104
37.23.253.5.in-addr.arpa domain name pointer 5-253-23-37.static.as134743.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
37.23.253.5.in-addr.arpa name = 5-253-23-37.static.as134743.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.137.137.92 | attack | Nov 2 23:58:56 plusreed sshd[19779]: Invalid user kslaw from 41.137.137.92 ... |
2019-11-03 12:05:34 |
| 122.176.123.236 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-11-03 08:05:55 |
| 185.56.224.26 | attackspambots | Nov 3 06:42:24 server sshd\[28139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.56.224.26 user=root Nov 3 06:42:26 server sshd\[28139\]: Failed password for root from 185.56.224.26 port 35510 ssh2 Nov 3 06:59:18 server sshd\[32195\]: Invalid user dokuwiki from 185.56.224.26 Nov 3 06:59:18 server sshd\[32195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.56.224.26 Nov 3 06:59:20 server sshd\[32195\]: Failed password for invalid user dokuwiki from 185.56.224.26 port 33776 ssh2 ... |
2019-11-03 12:05:05 |
| 113.163.220.180 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-11-03 08:25:24 |
| 81.22.45.159 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 75 - port: 62384 proto: TCP cat: Misc Attack |
2019-11-03 12:18:24 |
| 180.76.101.100 | attackbots | Nov 3 04:49:32 lnxweb62 sshd[4749]: Failed password for root from 180.76.101.100 port 59078 ssh2 Nov 3 04:54:31 lnxweb62 sshd[7676]: Failed password for root from 180.76.101.100 port 41038 ssh2 Nov 3 04:59:26 lnxweb62 sshd[10394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.101.100 |
2019-11-03 12:00:55 |
| 113.243.75.187 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-11-03 08:24:15 |
| 115.238.129.137 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2019-11-03 08:19:23 |
| 118.172.47.18 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2019-11-03 08:09:19 |
| 118.112.124.194 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2019-11-03 08:10:21 |
| 117.3.81.239 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-11-03 08:16:27 |
| 144.217.214.25 | attackspam | Nov 3 04:58:01 SilenceServices sshd[15222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.214.25 Nov 3 04:58:03 SilenceServices sshd[15222]: Failed password for invalid user 102030102030 from 144.217.214.25 port 53576 ssh2 Nov 3 05:02:03 SilenceServices sshd[19514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.214.25 |
2019-11-03 12:02:40 |
| 221.221.178.139 | attack | Nov 1 01:55:36 cumulus sshd[3032]: Invalid user ghostname from 221.221.178.139 port 45164 Nov 1 01:55:36 cumulus sshd[3032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.221.178.139 Nov 1 01:55:38 cumulus sshd[3032]: Failed password for invalid user ghostname from 221.221.178.139 port 45164 ssh2 Nov 1 01:55:38 cumulus sshd[3032]: Received disconnect from 221.221.178.139 port 45164:11: Bye Bye [preauth] Nov 1 01:55:38 cumulus sshd[3032]: Disconnected from 221.221.178.139 port 45164 [preauth] Nov 1 02:21:06 cumulus sshd[3837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.221.178.139 user=r.r Nov 1 02:21:08 cumulus sshd[3837]: Failed password for r.r from 221.221.178.139 port 60104 ssh2 Nov 1 02:21:09 cumulus sshd[3837]: Received disconnect from 221.221.178.139 port 60104:11: Bye Bye [preauth] Nov 1 02:21:09 cumulus sshd[3837]: Disconnected from 221.221.178.139 port 6010........ ------------------------------- |
2019-11-03 12:05:50 |
| 151.56.255.208 | attackspam | Automatic report - Port Scan Attack |
2019-11-03 12:17:59 |
| 49.233.79.48 | attackspam | Triggered by Fail2Ban at Ares web server |
2019-11-03 12:06:50 |