City: Huntington
Region: West Virginia
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.121.213.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49078
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.121.213.66. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 10:00:31 CST 2025
;; MSG SIZE rcvd: 106
66.213.121.50.in-addr.arpa domain name pointer 50-121-213-66.drr03.clbg.wv.frontiernet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
66.213.121.50.in-addr.arpa name = 50-121-213-66.drr03.clbg.wv.frontiernet.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
47.148.72.121 | attackbots | port scan and connect, tcp 23 (telnet) |
2020-07-20 02:53:06 |
49.88.112.76 | attackbotsspam | Jul 19 15:35:12 dns1 sshd[24912]: Failed password for root from 49.88.112.76 port 50223 ssh2 Jul 19 15:35:16 dns1 sshd[24912]: Failed password for root from 49.88.112.76 port 50223 ssh2 Jul 19 15:35:20 dns1 sshd[24912]: Failed password for root from 49.88.112.76 port 50223 ssh2 |
2020-07-20 02:46:55 |
212.102.33.219 | attackbotsspam | IP: 212.102.33.219 Ports affected HTTP protocol over TLS/SSL (443) Abuse Confidence rating 28% Found in DNSBL('s) ASN Details AS60068 Datacamp Limited United States (US) CIDR 212.102.32.0/20 Log Date: 19/07/2020 5:05:07 PM UTC |
2020-07-20 02:40:46 |
46.101.248.180 | attack | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-07-20 02:39:28 |
37.147.83.197 | attackbots | ... |
2020-07-20 02:51:32 |
134.175.249.204 | attackbotsspam | Jul 19 17:33:45 localhost sshd[114540]: Invalid user servers from 134.175.249.204 port 38774 Jul 19 17:33:45 localhost sshd[114540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.249.204 Jul 19 17:33:45 localhost sshd[114540]: Invalid user servers from 134.175.249.204 port 38774 Jul 19 17:33:46 localhost sshd[114540]: Failed password for invalid user servers from 134.175.249.204 port 38774 ssh2 Jul 19 17:39:35 localhost sshd[115087]: Invalid user berni from 134.175.249.204 port 52012 ... |
2020-07-20 02:50:54 |
103.145.12.208 | attackbotsspam |
|
2020-07-20 02:56:51 |
200.77.176.212 | attackbotsspam | Jul 19 17:59:05 mail.srvfarm.net postfix/smtps/smtpd[3084237]: warning: unknown[200.77.176.212]: SASL PLAIN authentication failed: Jul 19 17:59:06 mail.srvfarm.net postfix/smtps/smtpd[3084237]: lost connection after AUTH from unknown[200.77.176.212] Jul 19 18:01:51 mail.srvfarm.net postfix/smtpd[3085180]: warning: unknown[200.77.176.212]: SASL PLAIN authentication failed: Jul 19 18:01:52 mail.srvfarm.net postfix/smtpd[3085180]: lost connection after AUTH from unknown[200.77.176.212] Jul 19 18:05:43 mail.srvfarm.net postfix/smtps/smtpd[3084239]: warning: unknown[200.77.176.212]: SASL PLAIN authentication failed: |
2020-07-20 02:47:38 |
179.35.231.215 | attackbots | Jul 19 18:56:28 game-panel sshd[4748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.35.231.215 Jul 19 18:56:30 game-panel sshd[4748]: Failed password for invalid user info from 179.35.231.215 port 39642 ssh2 Jul 19 18:59:49 game-panel sshd[4911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.35.231.215 |
2020-07-20 03:02:07 |
34.80.252.217 | attackbots | 34.80.252.217 - - [19/Jul/2020:17:55:58 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 34.80.252.217 - - [19/Jul/2020:18:06:20 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-07-20 02:41:58 |
27.71.227.198 | attackbots | Jul 19 18:30:40 ip-172-31-62-245 sshd\[14719\]: Invalid user demo from 27.71.227.198\ Jul 19 18:30:42 ip-172-31-62-245 sshd\[14719\]: Failed password for invalid user demo from 27.71.227.198 port 50588 ssh2\ Jul 19 18:37:14 ip-172-31-62-245 sshd\[14788\]: Invalid user specadm from 27.71.227.198\ Jul 19 18:37:16 ip-172-31-62-245 sshd\[14788\]: Failed password for invalid user specadm from 27.71.227.198 port 48248 ssh2\ Jul 19 18:39:47 ip-172-31-62-245 sshd\[14885\]: Invalid user services from 27.71.227.198\ |
2020-07-20 03:05:23 |
2804:18:7017:e005:c8b7:9c88:ad98:5cfe | attackspam | xmlrpc attack |
2020-07-20 02:37:10 |
117.239.232.59 | attack | 2020-07-19T14:36:48.537843vps2034 sshd[28445]: Invalid user dynamic from 117.239.232.59 port 37345 2020-07-19T14:36:48.547217vps2034 sshd[28445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.239.232.59 2020-07-19T14:36:48.537843vps2034 sshd[28445]: Invalid user dynamic from 117.239.232.59 port 37345 2020-07-19T14:36:50.926996vps2034 sshd[28445]: Failed password for invalid user dynamic from 117.239.232.59 port 37345 ssh2 2020-07-19T14:39:16.719425vps2034 sshd[2313]: Invalid user git from 117.239.232.59 port 55545 ... |
2020-07-20 02:49:54 |
103.204.189.168 | attack | Jul 19 17:52:45 mail.srvfarm.net postfix/smtps/smtpd[3084254]: warning: unknown[103.204.189.168]: SASL PLAIN authentication failed: Jul 19 17:52:46 mail.srvfarm.net postfix/smtps/smtpd[3084254]: lost connection after AUTH from unknown[103.204.189.168] Jul 19 17:59:13 mail.srvfarm.net postfix/smtps/smtpd[3084232]: warning: unknown[103.204.189.168]: SASL PLAIN authentication failed: Jul 19 17:59:13 mail.srvfarm.net postfix/smtps/smtpd[3084232]: lost connection after AUTH from unknown[103.204.189.168] Jul 19 18:02:10 mail.srvfarm.net postfix/smtpd[3085180]: warning: unknown[103.204.189.168]: SASL PLAIN authentication failed: |
2020-07-20 03:12:37 |
222.186.175.23 | attack | Banned for a week because repeated abuses, for example SSH, but not only |
2020-07-20 03:10:57 |