City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.45.243.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33758
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;53.45.243.6. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 02:26:31 CST 2025
;; MSG SIZE rcvd: 104
Host 6.243.45.53.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 6.243.45.53.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 178.128.237.36 | attackbotsspam | Oct 6 18:11:49 keyhelp sshd[11827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.237.36 user=r.r Oct 6 18:11:51 keyhelp sshd[11827]: Failed password for r.r from 178.128.237.36 port 33640 ssh2 Oct 6 18:11:51 keyhelp sshd[11827]: Received disconnect from 178.128.237.36 port 33640:11: Bye Bye [preauth] Oct 6 18:11:51 keyhelp sshd[11827]: Disconnected from 178.128.237.36 port 33640 [preauth] Oct 6 18:21:41 keyhelp sshd[13954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.237.36 user=r.r Oct 6 18:21:43 keyhelp sshd[13954]: Failed password for r.r from 178.128.237.36 port 43030 ssh2 Oct 6 18:21:43 keyhelp sshd[13954]: Received disconnect from 178.128.237.36 port 43030:11: Bye Bye [preauth] Oct 6 18:21:43 keyhelp sshd[13954]: Disconnected from 178.128.237.36 port 43030 [preauth] Oct 6 18:40:03 keyhelp sshd[17561]: Invalid user Auto2017 from 178.128.237.36 Oct 6 18........ ------------------------------- |
2019-10-09 18:33:47 |
| 158.69.113.39 | attackbots | Aug 10 19:40:27 server sshd\[84751\]: Invalid user beehive from 158.69.113.39 Aug 10 19:40:27 server sshd\[84751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.113.39 Aug 10 19:40:30 server sshd\[84751\]: Failed password for invalid user beehive from 158.69.113.39 port 45464 ssh2 ... |
2019-10-09 18:26:04 |
| 159.192.144.203 | attack | May 7 15:15:53 server sshd\[194364\]: Invalid user rex from 159.192.144.203 May 7 15:15:53 server sshd\[194364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.144.203 May 7 15:15:55 server sshd\[194364\]: Failed password for invalid user rex from 159.192.144.203 port 47594 ssh2 ... |
2019-10-09 18:11:52 |
| 157.230.241.240 | attackspambots | May 8 16:18:09 server sshd\[229549\]: Invalid user vagrant from 157.230.241.240 May 8 16:18:09 server sshd\[229549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.241.240 May 8 16:18:11 server sshd\[229549\]: Failed password for invalid user vagrant from 157.230.241.240 port 42864 ssh2 ... |
2019-10-09 18:43:41 |
| 157.230.39.61 | attack | Apr 22 18:51:36 server sshd\[48523\]: Invalid user jesus from 157.230.39.61 Apr 22 18:51:36 server sshd\[48523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.39.61 Apr 22 18:51:39 server sshd\[48523\]: Failed password for invalid user jesus from 157.230.39.61 port 54090 ssh2 ... |
2019-10-09 18:35:39 |
| 157.230.43.108 | attackbots | Aug 12 21:42:33 server sshd\[175025\]: Invalid user backups from 157.230.43.108 Aug 12 21:42:33 server sshd\[175025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.43.108 Aug 12 21:42:35 server sshd\[175025\]: Failed password for invalid user backups from 157.230.43.108 port 35536 ssh2 ... |
2019-10-09 18:34:49 |
| 81.149.211.134 | attack | Oct 9 09:22:51 *** sshd[11947]: Invalid user admin from 81.149.211.134 |
2019-10-09 18:13:18 |
| 158.69.112.95 | attackspambots | Jul 1 17:52:40 server sshd\[143232\]: Invalid user von from 158.69.112.95 Jul 1 17:52:40 server sshd\[143232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.112.95 Jul 1 17:52:42 server sshd\[143232\]: Failed password for invalid user von from 158.69.112.95 port 34536 ssh2 ... |
2019-10-09 18:26:16 |
| 51.38.37.128 | attackspam | Oct 9 06:52:36 vpn01 sshd[12873]: Failed password for root from 51.38.37.128 port 39901 ssh2 ... |
2019-10-09 18:38:16 |
| 139.162.218.162 | attackspambots | Received: from 10.197.32.140 (EHLO contato15.atendimentosexclusivos.online) (139.162.218.162) linode.com |
2019-10-09 18:07:35 |
| 222.186.169.194 | attackspam | Oct 9 12:15:49 Ubuntu-1404-trusty-64-minimal sshd\[27538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root Oct 9 12:15:51 Ubuntu-1404-trusty-64-minimal sshd\[27538\]: Failed password for root from 222.186.169.194 port 31798 ssh2 Oct 9 12:16:17 Ubuntu-1404-trusty-64-minimal sshd\[27617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root Oct 9 12:16:19 Ubuntu-1404-trusty-64-minimal sshd\[27617\]: Failed password for root from 222.186.169.194 port 35358 ssh2 Oct 9 12:16:49 Ubuntu-1404-trusty-64-minimal sshd\[27776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root |
2019-10-09 18:27:04 |
| 111.53.153.99 | attack | Unauthorised access (Oct 9) SRC=111.53.153.99 LEN=40 TTL=50 ID=58194 TCP DPT=23 WINDOW=63102 SYN |
2019-10-09 18:08:08 |
| 108.222.68.232 | attackbotsspam | Oct 9 05:47:47 h2177944 sshd\[7349\]: Invalid user P@ssw0rt_123 from 108.222.68.232 port 46606 Oct 9 05:47:47 h2177944 sshd\[7349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.222.68.232 Oct 9 05:47:50 h2177944 sshd\[7349\]: Failed password for invalid user P@ssw0rt_123 from 108.222.68.232 port 46606 ssh2 Oct 9 05:51:45 h2177944 sshd\[7467\]: Invalid user !@\#admin123 from 108.222.68.232 port 58366 ... |
2019-10-09 18:15:03 |
| 157.230.253.128 | attackspam | Aug 20 05:04:04 server sshd\[214594\]: Invalid user alex from 157.230.253.128 Aug 20 05:04:05 server sshd\[214594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.253.128 Aug 20 05:04:08 server sshd\[214594\]: Failed password for invalid user alex from 157.230.253.128 port 38888 ssh2 ... |
2019-10-09 18:39:51 |
| 158.69.192.147 | attackspambots | May 13 21:11:38 server sshd\[170085\]: Invalid user ar from 158.69.192.147 May 13 21:11:38 server sshd\[170085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.147 May 13 21:11:40 server sshd\[170085\]: Failed password for invalid user ar from 158.69.192.147 port 46432 ssh2 ... |
2019-10-09 18:23:20 |