City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.52.40.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50006
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.52.40.66. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 00:51:24 CST 2025
;; MSG SIZE rcvd: 104
66.40.52.50.in-addr.arpa domain name pointer 50-52-40-66.cral.id.ptr.ziplyfiber.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
66.40.52.50.in-addr.arpa name = 50-52-40-66.cral.id.ptr.ziplyfiber.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
129.211.38.207 | attack | Aug 11 22:19:47 Ubuntu-1404-trusty-64-minimal sshd\[3131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.38.207 user=root Aug 11 22:19:50 Ubuntu-1404-trusty-64-minimal sshd\[3131\]: Failed password for root from 129.211.38.207 port 39110 ssh2 Aug 11 22:29:36 Ubuntu-1404-trusty-64-minimal sshd\[8368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.38.207 user=root Aug 11 22:29:38 Ubuntu-1404-trusty-64-minimal sshd\[8368\]: Failed password for root from 129.211.38.207 port 40594 ssh2 Aug 11 22:35:51 Ubuntu-1404-trusty-64-minimal sshd\[14626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.38.207 user=root |
2020-08-12 06:24:46 |
112.78.183.21 | attackbots | Aug 11 23:39:28 santamaria sshd\[32665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.183.21 user=root Aug 11 23:39:30 santamaria sshd\[32665\]: Failed password for root from 112.78.183.21 port 57898 ssh2 Aug 11 23:43:50 santamaria sshd\[32733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.183.21 user=root ... |
2020-08-12 06:26:15 |
176.113.115.247 | attackspambots | firewall-block, port(s): 20469/tcp |
2020-08-12 06:42:45 |
46.229.168.142 | attackspambots | Automatic report - Banned IP Access |
2020-08-12 06:40:22 |
81.68.67.173 | attackspambots | Aug 11 22:43:33 ip106 sshd[30160]: Failed password for root from 81.68.67.173 port 59386 ssh2 ... |
2020-08-12 06:12:54 |
132.232.43.111 | attack | Aug 11 22:23:17 ns382633 sshd\[7320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.43.111 user=root Aug 11 22:23:19 ns382633 sshd\[7320\]: Failed password for root from 132.232.43.111 port 34118 ssh2 Aug 11 22:31:21 ns382633 sshd\[8931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.43.111 user=root Aug 11 22:31:24 ns382633 sshd\[8931\]: Failed password for root from 132.232.43.111 port 41404 ssh2 Aug 11 22:36:01 ns382633 sshd\[9781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.43.111 user=root |
2020-08-12 06:14:49 |
106.12.194.204 | attackspambots | Aug 12 01:58:33 lunarastro sshd[29861]: Failed password for root from 106.12.194.204 port 57476 ssh2 Aug 12 02:05:23 lunarastro sshd[29953]: Failed password for root from 106.12.194.204 port 51962 ssh2 |
2020-08-12 06:09:01 |
192.157.233.175 | attackspambots | Brute-force attempt banned |
2020-08-12 06:22:17 |
193.27.229.189 | attack | firewall-block, port(s): 22930/tcp, 40179/tcp, 51012/tcp, 55105/tcp |
2020-08-12 06:18:59 |
2.186.112.16 | attackspambots | Automatic report - Port Scan Attack |
2020-08-12 06:26:03 |
46.114.111.36 | attackspam | Chat Spam |
2020-08-12 06:27:49 |
51.75.30.199 | attack | Aug 11 21:26:29 django-0 sshd[21628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.ip-51-75-30.eu user=root Aug 11 21:26:31 django-0 sshd[21628]: Failed password for root from 51.75.30.199 port 52765 ssh2 ... |
2020-08-12 06:26:36 |
82.117.196.30 | attackspam | Fail2Ban Ban Triggered (2) |
2020-08-12 06:39:58 |
218.92.0.216 | attack | Aug 12 00:06:18 dev0-dcde-rnet sshd[3828]: Failed password for root from 218.92.0.216 port 46665 ssh2 Aug 12 00:06:26 dev0-dcde-rnet sshd[3830]: Failed password for root from 218.92.0.216 port 21786 ssh2 |
2020-08-12 06:07:21 |
206.189.145.233 | attack | Aug 11 23:38:27 abendstille sshd\[11004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.145.233 user=root Aug 11 23:38:29 abendstille sshd\[11004\]: Failed password for root from 206.189.145.233 port 37004 ssh2 Aug 11 23:41:06 abendstille sshd\[13711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.145.233 user=root Aug 11 23:41:09 abendstille sshd\[13711\]: Failed password for root from 206.189.145.233 port 50618 ssh2 Aug 11 23:43:52 abendstille sshd\[16344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.145.233 user=root ... |
2020-08-12 06:17:09 |