City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.140.53.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10550
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.140.53.73. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 02:52:22 CST 2025
;; MSG SIZE rcvd: 105
73.53.140.50.in-addr.arpa domain name pointer c-50-140-53-73.hsd1.fl.comcast.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
73.53.140.50.in-addr.arpa name = c-50-140-53-73.hsd1.fl.comcast.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 190.121.21.158 | attackspam | attempted connection to port 1433 |
2020-03-05 02:54:58 |
| 223.71.139.98 | attackspambots | 2020-03-04T17:55:15.358204shield sshd\[14470\]: Invalid user michael from 223.71.139.98 port 56850 2020-03-04T17:55:15.362982shield sshd\[14470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.98 2020-03-04T17:55:17.684411shield sshd\[14470\]: Failed password for invalid user michael from 223.71.139.98 port 56850 ssh2 2020-03-04T18:01:54.905937shield sshd\[15746\]: Invalid user web from 223.71.139.98 port 52166 2020-03-04T18:01:54.911634shield sshd\[15746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.98 |
2020-03-05 03:15:02 |
| 201.139.204.150 | attackspam | attempted connection to port 445 |
2020-03-05 02:47:41 |
| 118.27.17.141 | attack | SSH Brute Force |
2020-03-05 03:14:36 |
| 188.165.227.140 | attackbotsspam | Mar 4 19:23:08 sd-53420 sshd\[30694\]: Invalid user oracle from 188.165.227.140 Mar 4 19:23:08 sd-53420 sshd\[30694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.227.140 Mar 4 19:23:09 sd-53420 sshd\[30694\]: Failed password for invalid user oracle from 188.165.227.140 port 58479 ssh2 Mar 4 19:26:36 sd-53420 sshd\[30970\]: User postgres from 188.165.227.140 not allowed because none of user's groups are listed in AllowGroups Mar 4 19:26:36 sd-53420 sshd\[30970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.227.140 user=postgres ... |
2020-03-05 02:52:44 |
| 222.186.175.215 | attack | Mar 5 00:38:32 areeb-Workstation sshd[4628]: Failed password for root from 222.186.175.215 port 11326 ssh2 Mar 5 00:38:35 areeb-Workstation sshd[4628]: Failed password for root from 222.186.175.215 port 11326 ssh2 ... |
2020-03-05 03:20:31 |
| 202.88.241.107 | attack | Mar 4 13:47:59 targaryen sshd[26608]: Invalid user www from 202.88.241.107 Mar 4 13:51:53 targaryen sshd[26643]: Invalid user boutique from 202.88.241.107 Mar 4 13:55:42 targaryen sshd[26677]: Invalid user boutique.district1lasertag@123 from 202.88.241.107 Mar 4 13:59:27 targaryen sshd[26685]: Invalid user boutique from 202.88.241.107 ... |
2020-03-05 03:23:06 |
| 103.74.120.134 | attackspambots | attempted connection to port 445 |
2020-03-05 03:08:45 |
| 123.30.149.76 | attack | 2020-03-04T18:09:43.200431 sshd[8119]: Invalid user miaohaoran from 123.30.149.76 port 43912 2020-03-04T18:09:43.214212 sshd[8119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.149.76 2020-03-04T18:09:43.200431 sshd[8119]: Invalid user miaohaoran from 123.30.149.76 port 43912 2020-03-04T18:09:45.144284 sshd[8119]: Failed password for invalid user miaohaoran from 123.30.149.76 port 43912 ssh2 ... |
2020-03-05 03:19:48 |
| 84.197.253.234 | attackspam | Fail2Ban - SSH Bruteforce Attempt |
2020-03-05 03:16:21 |
| 220.255.120.15 | attackspambots | Brute-Force reported by Fail2Ban |
2020-03-05 02:59:44 |
| 89.248.172.85 | attackbotsspam | Triggered: repeated knocking on closed ports. |
2020-03-05 03:15:58 |
| 223.206.229.235 | attackbotsspam | 1583328837 - 03/04/2020 14:33:57 Host: 223.206.229.235/223.206.229.235 Port: 445 TCP Blocked |
2020-03-05 02:59:21 |
| 167.114.3.105 | attackspambots | Mar 4 20:33:21 lukav-desktop sshd\[13191\]: Invalid user minecraft from 167.114.3.105 Mar 4 20:33:21 lukav-desktop sshd\[13191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.3.105 Mar 4 20:33:23 lukav-desktop sshd\[13191\]: Failed password for invalid user minecraft from 167.114.3.105 port 39396 ssh2 Mar 4 20:41:24 lukav-desktop sshd\[13276\]: Invalid user dping from 167.114.3.105 Mar 4 20:41:24 lukav-desktop sshd\[13276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.3.105 |
2020-03-05 02:57:57 |
| 222.186.30.167 | attack | Mar 4 16:12:07 firewall sshd[18013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167 user=root Mar 4 16:12:09 firewall sshd[18013]: Failed password for root from 222.186.30.167 port 26369 ssh2 Mar 4 16:12:11 firewall sshd[18013]: Failed password for root from 222.186.30.167 port 26369 ssh2 ... |
2020-03-05 03:12:38 |