City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.45.58.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52906
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.45.58.137. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:12:12 CST 2025
;; MSG SIZE rcvd: 105
137.58.45.50.in-addr.arpa domain name pointer 50-45-58-137.crdl.il.frontiernet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
137.58.45.50.in-addr.arpa name = 50-45-58-137.crdl.il.frontiernet.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.38.238.22 | attackspambots | Oct 7 13:34:57 icinga sshd[51358]: Failed password for root from 51.38.238.22 port 44166 ssh2 Oct 7 13:39:49 icinga sshd[54603]: Failed password for root from 51.38.238.22 port 34812 ssh2 ... |
2019-10-07 23:38:31 |
| 81.183.253.86 | attack | Oct 7 04:14:21 kapalua sshd\[1506\]: Invalid user Wild@123 from 81.183.253.86 Oct 7 04:14:21 kapalua sshd\[1506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsl51b7fd56.fixip.t-online.hu Oct 7 04:14:23 kapalua sshd\[1506\]: Failed password for invalid user Wild@123 from 81.183.253.86 port 58034 ssh2 Oct 7 04:19:34 kapalua sshd\[2051\]: Invalid user Passw0rt1234 from 81.183.253.86 Oct 7 04:19:34 kapalua sshd\[2051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsl51b7fd56.fixip.t-online.hu |
2019-10-07 23:27:42 |
| 218.189.15.187 | attackbots | SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2019-10-07 23:50:04 |
| 200.34.88.37 | attack | Oct 7 22:47:59 webhost01 sshd[20498]: Failed password for root from 200.34.88.37 port 52646 ssh2 ... |
2019-10-07 23:52:50 |
| 58.56.9.5 | attack | SSH Bruteforce |
2019-10-07 23:24:29 |
| 177.8.255.9 | attackspambots | Oct 7 13:43:00 dev sshd\[10957\]: Invalid user admin from 177.8.255.9 port 56658 Oct 7 13:43:00 dev sshd\[10957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.8.255.9 Oct 7 13:43:01 dev sshd\[10957\]: Failed password for invalid user admin from 177.8.255.9 port 56658 ssh2 |
2019-10-07 23:29:31 |
| 49.234.62.144 | attackspambots | DATE:2019-10-07 13:43:18,IP:49.234.62.144,MATCHES:10,PORT:ssh |
2019-10-07 23:42:21 |
| 103.8.119.166 | attackbotsspam | 2019-10-07T15:31:14.137824abusebot-5.cloudsearch.cf sshd\[23071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.8.119.166 user=root |
2019-10-07 23:40:10 |
| 190.254.195.91 | attackbotsspam | Honeypot attack, port: 23, PTR: PTR record not found |
2019-10-07 23:26:08 |
| 14.161.45.253 | attackspambots | Oct 7 13:42:52 dev sshd\[10939\]: Invalid user admin from 14.161.45.253 port 44058 Oct 7 13:42:52 dev sshd\[10939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.45.253 Oct 7 13:42:54 dev sshd\[10939\]: Failed password for invalid user admin from 14.161.45.253 port 44058 ssh2 |
2019-10-07 23:54:55 |
| 202.187.153.147 | attackspam | Automatic report - Port Scan Attack |
2019-10-07 23:18:36 |
| 106.13.120.46 | attack | Oct 7 17:47:24 server sshd\[25555\]: User root from 106.13.120.46 not allowed because listed in DenyUsers Oct 7 17:47:24 server sshd\[25555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.120.46 user=root Oct 7 17:47:26 server sshd\[25555\]: Failed password for invalid user root from 106.13.120.46 port 47276 ssh2 Oct 7 17:53:25 server sshd\[18994\]: User root from 106.13.120.46 not allowed because listed in DenyUsers Oct 7 17:53:25 server sshd\[18994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.120.46 user=root |
2019-10-07 23:57:25 |
| 106.12.109.188 | attack | Oct 7 17:40:52 legacy sshd[30777]: Failed password for root from 106.12.109.188 port 41022 ssh2 Oct 7 17:45:26 legacy sshd[30918]: Failed password for root from 106.12.109.188 port 44720 ssh2 ... |
2019-10-07 23:55:30 |
| 5.196.29.194 | attack | Oct 7 14:18:45 unicornsoft sshd\[24280\]: User root from 5.196.29.194 not allowed because not listed in AllowUsers Oct 7 14:18:45 unicornsoft sshd\[24280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.29.194 user=root Oct 7 14:18:47 unicornsoft sshd\[24280\]: Failed password for invalid user root from 5.196.29.194 port 37587 ssh2 |
2019-10-07 23:48:55 |
| 175.203.106.123 | attack | Automatic report - Banned IP Access |
2019-10-07 23:17:06 |