City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.93.221.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17917
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.93.221.212. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 19:35:25 CST 2025
;; MSG SIZE rcvd: 106
b'Host 212.221.93.50.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 50.93.221.212.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 173.239.139.38 | attack | Nov 2 21:30:39 localhost sshd\[6343\]: Invalid user 2wsxcde34rfv from 173.239.139.38 Nov 2 21:30:39 localhost sshd\[6343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.239.139.38 Nov 2 21:30:41 localhost sshd\[6343\]: Failed password for invalid user 2wsxcde34rfv from 173.239.139.38 port 49170 ssh2 Nov 2 21:34:44 localhost sshd\[6400\]: Invalid user kl6351122 from 173.239.139.38 Nov 2 21:34:44 localhost sshd\[6400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.239.139.38 ... |
2019-11-03 05:38:27 |
| 113.28.150.73 | attackspam | Nov 2 21:18:42 MK-Soft-VM4 sshd[20600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.28.150.73 Nov 2 21:18:43 MK-Soft-VM4 sshd[20600]: Failed password for invalid user 123456qwertyuiop from 113.28.150.73 port 52129 ssh2 ... |
2019-11-03 05:49:52 |
| 222.186.180.41 | attackbotsspam | Nov 2 11:05:33 web1 sshd\[11111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41 user=root Nov 2 11:05:35 web1 sshd\[11111\]: Failed password for root from 222.186.180.41 port 32992 ssh2 Nov 2 11:06:00 web1 sshd\[11150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41 user=root Nov 2 11:06:02 web1 sshd\[11150\]: Failed password for root from 222.186.180.41 port 32440 ssh2 Nov 2 11:06:32 web1 sshd\[11188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41 user=root |
2019-11-03 05:15:52 |
| 45.76.95.136 | attackspam | 2019-11-02T22:33:44.898321scmdmz1 sshd\[24637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.76.95.136 user=root 2019-11-02T22:33:46.719224scmdmz1 sshd\[24637\]: Failed password for root from 45.76.95.136 port 1234 ssh2 2019-11-02T22:36:58.141324scmdmz1 sshd\[24892\]: Invalid user stage from 45.76.95.136 port 39458 ... |
2019-11-03 05:43:11 |
| 178.176.60.196 | attackbots | Nov 2 22:20:37 vtv3 sshd\[24295\]: Invalid user tset from 178.176.60.196 port 43924 Nov 2 22:20:37 vtv3 sshd\[24295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.176.60.196 Nov 2 22:20:39 vtv3 sshd\[24295\]: Failed password for invalid user tset from 178.176.60.196 port 43924 ssh2 Nov 2 22:24:35 vtv3 sshd\[25889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.176.60.196 user=root Nov 2 22:24:38 vtv3 sshd\[25889\]: Failed password for root from 178.176.60.196 port 53388 ssh2 Nov 2 22:36:15 vtv3 sshd\[32344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.176.60.196 user=root Nov 2 22:36:17 vtv3 sshd\[32344\]: Failed password for root from 178.176.60.196 port 53538 ssh2 Nov 2 22:40:13 vtv3 sshd\[2102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.176.60.196 user=root Nov 2 22:40:15 vtv3 sshd\[2102\]: |
2019-11-03 05:12:52 |
| 104.211.36.201 | attackbotsspam | 2019-11-02T22:27:20.617586scmdmz1 sshd\[24127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.36.201 user=root 2019-11-02T22:27:22.388432scmdmz1 sshd\[24127\]: Failed password for root from 104.211.36.201 port 55720 ssh2 2019-11-02T22:31:54.277855scmdmz1 sshd\[24469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.36.201 user=root ... |
2019-11-03 05:41:15 |
| 134.175.46.166 | attackbotsspam | Nov 2 21:53:43 lnxded63 sshd[16806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.46.166 Nov 2 21:53:43 lnxded63 sshd[16806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.46.166 |
2019-11-03 05:13:45 |
| 106.12.21.212 | attack | Nov 2 14:38:44 mockhub sshd[27158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.21.212 Nov 2 14:38:46 mockhub sshd[27158]: Failed password for invalid user benoit123 from 106.12.21.212 port 32818 ssh2 ... |
2019-11-03 05:42:30 |
| 148.70.11.178 | attackspambots | Connection by 148.70.11.178 on port: 139 got caught by honeypot at 11/2/2019 8:19:29 PM |
2019-11-03 05:20:08 |
| 185.80.54.35 | attackspambots | slow and persistent scanner |
2019-11-03 05:23:26 |
| 110.136.94.199 | attack | " " |
2019-11-03 05:17:55 |
| 106.54.114.208 | attack | Oct 28 14:03:20 nxxxxxxx0 sshd[1598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.114.208 user=r.r Oct 28 14:03:22 nxxxxxxx0 sshd[1598]: Failed password for r.r from 106.54.114.208 port 35356 ssh2 Oct 28 14:03:22 nxxxxxxx0 sshd[1598]: Received disconnect from 106.54.114.208: 11: Bye Bye [preauth] Oct 28 14:16:28 nxxxxxxx0 sshd[3754]: Connection closed by 106.54.114.208 [preauth] Oct 28 14:28:02 nxxxxxxx0 sshd[5185]: Connection closed by 106.54.114.208 [preauth] Oct 28 14:33:23 nxxxxxxx0 sshd[6093]: Connection closed by 106.54.114.208 [preauth] Oct 28 14:38:59 nxxxxxxx0 sshd[6656]: Invalid user postgres from 106.54.114.208 Oct 28 14:38:59 nxxxxxxx0 sshd[6656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.114.208 Oct 28 14:39:01 nxxxxxxx0 sshd[6656]: Failed password for invalid user postgres from 106.54.114.208 port 55548 ssh2 Oct 28 14:39:01 nxxxxxxx0 sshd[6656]: Receiv........ ------------------------------- |
2019-11-03 05:51:00 |
| 52.187.134.43 | attackspam | $f2bV_matches |
2019-11-03 05:33:32 |
| 60.182.199.215 | attackspam | $f2bV_matches |
2019-11-03 05:14:48 |
| 185.156.73.52 | attackbots | 11/02/2019-17:10:00.231144 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-11-03 05:17:19 |