City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.0.66.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17560
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;55.0.66.198. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 22:37:36 CST 2025
;; MSG SIZE rcvd: 104
b'Host 198.66.0.55.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 55.0.66.198.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 54.37.233.192 | attackspam | Oct 18 18:52:48 vmanager6029 sshd\[3076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.233.192 user=root Oct 18 18:52:50 vmanager6029 sshd\[3076\]: Failed password for root from 54.37.233.192 port 55646 ssh2 Oct 18 18:57:26 vmanager6029 sshd\[3191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.233.192 user=root |
2019-10-19 01:16:17 |
| 167.99.12.56 | attack | Oct 15 21:18:57 finn sshd[27362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.12.56 user=r.r Oct 15 21:18:59 finn sshd[27362]: Failed password for r.r from 167.99.12.56 port 57320 ssh2 Oct 15 21:18:59 finn sshd[27362]: Received disconnect from 167.99.12.56 port 57320:11: Bye Bye [preauth] Oct 15 21:18:59 finn sshd[27362]: Disconnected from 167.99.12.56 port 57320 [preauth] Oct 15 21:39:43 finn sshd[31344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.12.56 user=r.r Oct 15 21:39:45 finn sshd[31344]: Failed password for r.r from 167.99.12.56 port 50394 ssh2 Oct 15 21:39:45 finn sshd[31344]: Received disconnect from 167.99.12.56 port 50394:11: Bye Bye [preauth] Oct 15 21:39:45 finn sshd[31344]: Disconnected from 167.99.12.56 port 50394 [preauth] Oct 15 21:43:19 finn sshd[32277]: Invalid user raimax from 167.99.12.56 port 35072 Oct 15 21:43:19 finn sshd[32277]: pam_unix(ss........ ------------------------------- |
2019-10-19 01:36:50 |
| 68.183.236.92 | attackbots | Oct 18 07:28:54 tdfoods sshd\[17486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.92 user=root Oct 18 07:28:56 tdfoods sshd\[17486\]: Failed password for root from 68.183.236.92 port 54466 ssh2 Oct 18 07:33:17 tdfoods sshd\[17844\]: Invalid user admin from 68.183.236.92 Oct 18 07:33:17 tdfoods sshd\[17844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.92 Oct 18 07:33:19 tdfoods sshd\[17844\]: Failed password for invalid user admin from 68.183.236.92 port 38012 ssh2 |
2019-10-19 01:37:24 |
| 110.4.45.99 | attack | Automatic report - XMLRPC Attack |
2019-10-19 01:21:26 |
| 202.131.231.210 | attackspambots | Oct 18 17:20:26 localhost sshd\[126386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.231.210 user=root Oct 18 17:20:28 localhost sshd\[126386\]: Failed password for root from 202.131.231.210 port 59520 ssh2 Oct 18 17:25:10 localhost sshd\[126550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.231.210 user=root Oct 18 17:25:13 localhost sshd\[126550\]: Failed password for root from 202.131.231.210 port 43060 ssh2 Oct 18 17:29:36 localhost sshd\[126744\]: Invalid user cliff from 202.131.231.210 port 54828 Oct 18 17:29:36 localhost sshd\[126744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.231.210 ... |
2019-10-19 01:38:38 |
| 223.171.32.55 | attackbotsspam | $f2bV_matches |
2019-10-19 01:33:26 |
| 172.81.212.111 | attackbotsspam | Oct 18 19:05:48 server sshd\[16654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.212.111 user=root Oct 18 19:05:50 server sshd\[16654\]: Failed password for root from 172.81.212.111 port 53056 ssh2 Oct 18 19:28:32 server sshd\[22356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.212.111 user=root Oct 18 19:28:34 server sshd\[22356\]: Failed password for root from 172.81.212.111 port 35248 ssh2 Oct 18 19:33:02 server sshd\[23684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.212.111 user=root ... |
2019-10-19 01:39:22 |
| 31.27.167.218 | attack | Server penetration trying other domain names than server publicly serves (ex https://localhost) |
2019-10-19 01:16:34 |
| 128.199.107.252 | attackbotsspam | Oct 18 18:09:19 h2177944 sshd\[8346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.107.252 Oct 18 18:09:21 h2177944 sshd\[8346\]: Failed password for invalid user verbatim from 128.199.107.252 port 57732 ssh2 Oct 18 19:10:08 h2177944 sshd\[11169\]: Invalid user alyssa from 128.199.107.252 port 41490 Oct 18 19:10:08 h2177944 sshd\[11169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.107.252 ... |
2019-10-19 01:50:52 |
| 89.109.23.190 | attack | Oct 18 16:35:56 sauna sshd[43900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.109.23.190 Oct 18 16:35:58 sauna sshd[43900]: Failed password for invalid user test from 89.109.23.190 port 45166 ssh2 ... |
2019-10-19 01:26:19 |
| 67.215.225.103 | attackspambots | Oct 18 05:12:36 friendsofhawaii sshd\[22233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.215.225.103 user=root Oct 18 05:12:38 friendsofhawaii sshd\[22233\]: Failed password for root from 67.215.225.103 port 33564 ssh2 Oct 18 05:16:43 friendsofhawaii sshd\[22556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.215.225.103 user=root Oct 18 05:16:45 friendsofhawaii sshd\[22556\]: Failed password for root from 67.215.225.103 port 55858 ssh2 Oct 18 05:20:54 friendsofhawaii sshd\[22890\]: Invalid user nano from 67.215.225.103 |
2019-10-19 01:44:07 |
| 87.236.92.138 | attackspam | [portscan] Port scan |
2019-10-19 01:39:48 |
| 51.38.37.154 | attackbotsspam | Automatic report - XMLRPC Attack |
2019-10-19 01:33:53 |
| 145.239.69.74 | attackspambots | B: /wp-login.php attack |
2019-10-19 01:43:25 |
| 163.172.229.167 | attack | Prolific spammer. |
2019-10-19 01:32:38 |