City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.54.194.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;53.54.194.99. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 09:14:49 CST 2025
;; MSG SIZE rcvd: 105
Host 99.194.54.53.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 99.194.54.53.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 221.151.73.191 | attack | Unauthorized connection attempt detected from IP address 221.151.73.191 to port 23 |
2020-04-12 23:31:16 |
| 197.254.196.78 | attack | Unauthorized connection attempt detected from IP address 197.254.196.78 to port 445 |
2020-04-12 23:13:19 |
| 195.158.91.116 | attackbotsspam | Unauthorized connection attempt detected from IP address 195.158.91.116 to port 80 |
2020-04-12 23:35:45 |
| 2.228.39.100 | attack | Unauthorized connection attempt detected from IP address 2.228.39.100 to port 445 |
2020-04-12 23:29:07 |
| 189.144.250.9 | attack | Unauthorized connection attempt detected from IP address 189.144.250.9 to port 8000 |
2020-04-12 23:14:40 |
| 213.226.3.100 | attackbotsspam | Unauthorized connection attempt detected from IP address 213.226.3.100 to port 3389 |
2020-04-12 23:31:31 |
| 106.13.168.31 | attack | Apr 12 02:33:02 web9 sshd\[28729\]: Invalid user elastic from 106.13.168.31 Apr 12 02:33:02 web9 sshd\[28729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.168.31 Apr 12 02:33:04 web9 sshd\[28729\]: Failed password for invalid user elastic from 106.13.168.31 port 44316 ssh2 Apr 12 02:36:22 web9 sshd\[29391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.168.31 user=root Apr 12 02:36:24 web9 sshd\[29391\]: Failed password for root from 106.13.168.31 port 47316 ssh2 |
2020-04-12 23:03:13 |
| 190.3.111.10 | attackspambots | Unauthorized connection attempt detected from IP address 190.3.111.10 to port 8089 |
2020-04-12 23:40:39 |
| 193.202.45.202 | attack | Apr 12 16:37:08 debian-2gb-nbg1-2 kernel: \[8961226.917397\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=193.202.45.202 DST=195.201.40.59 LEN=443 TOS=0x08 PREC=0x00 TTL=47 ID=60931 DF PROTO=UDP SPT=5133 DPT=5060 LEN=423 |
2020-04-12 22:52:22 |
| 190.94.148.251 | attack | Unauthorized connection attempt detected from IP address 190.94.148.251 to port 8080 |
2020-04-12 23:39:44 |
| 5.101.50.112 | attackbots | Apr 12 16:53:07 rotator sshd\[11366\]: Invalid user jack from 5.101.50.112Apr 12 16:53:09 rotator sshd\[11366\]: Failed password for invalid user jack from 5.101.50.112 port 42642 ssh2Apr 12 16:57:05 rotator sshd\[12151\]: Invalid user jcseg-server from 5.101.50.112Apr 12 16:57:07 rotator sshd\[12151\]: Failed password for invalid user jcseg-server from 5.101.50.112 port 48098 ssh2Apr 12 17:01:21 rotator sshd\[12944\]: Invalid user duncan from 5.101.50.112Apr 12 17:01:24 rotator sshd\[12944\]: Failed password for invalid user duncan from 5.101.50.112 port 53554 ssh2 ... |
2020-04-12 23:02:11 |
| 175.211.233.28 | attackbotsspam | Unauthorized connection attempt detected from IP address 175.211.233.28 to port 23 |
2020-04-12 23:16:10 |
| 122.176.38.177 | attackbotsspam | 2020-04-12T13:01:32.705423abusebot-8.cloudsearch.cf sshd[12009]: Invalid user biz from 122.176.38.177 port 52402 2020-04-12T13:01:32.712395abusebot-8.cloudsearch.cf sshd[12009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.38.177 2020-04-12T13:01:32.705423abusebot-8.cloudsearch.cf sshd[12009]: Invalid user biz from 122.176.38.177 port 52402 2020-04-12T13:01:34.427599abusebot-8.cloudsearch.cf sshd[12009]: Failed password for invalid user biz from 122.176.38.177 port 52402 ssh2 2020-04-12T13:09:19.045124abusebot-8.cloudsearch.cf sshd[12453]: Invalid user ranger from 122.176.38.177 port 44460 2020-04-12T13:09:19.053051abusebot-8.cloudsearch.cf sshd[12453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.38.177 2020-04-12T13:09:19.045124abusebot-8.cloudsearch.cf sshd[12453]: Invalid user ranger from 122.176.38.177 port 44460 2020-04-12T13:09:20.878673abusebot-8.cloudsearch.cf sshd[12453]: Fai ... |
2020-04-12 23:07:16 |
| 177.185.157.65 | attackspam | Unauthorized connection attempt detected from IP address 177.185.157.65 to port 8080 |
2020-04-12 23:15:54 |
| 94.245.20.160 | attackspambots | Unauthorized connection attempt detected from IP address 94.245.20.160 to port 23 |
2020-04-12 23:23:07 |