City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.101.113.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64646
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;55.101.113.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 03:08:15 CST 2025
;; MSG SIZE rcvd: 107
b'Host 142.113.101.55.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 55.101.113.142.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 162.247.72.199 | attackbots | (sshd) Failed SSH login from 162.247.72.199 (US/United States/jaffer.tor-exit.calyxinstitute.org): 10 in the last 3600 secs |
2020-08-28 21:30:57 |
| 104.131.29.92 | attackspambots | Aug 28 09:24:31 NPSTNNYC01T sshd[13431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.29.92 Aug 28 09:24:33 NPSTNNYC01T sshd[13431]: Failed password for invalid user ftpuser from 104.131.29.92 port 32792 ssh2 Aug 28 09:24:48 NPSTNNYC01T sshd[13493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.29.92 ... |
2020-08-28 21:44:22 |
| 196.1.97.216 | attackspambots | Aug 28 08:04:47 george sshd[30114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.97.216 Aug 28 08:04:49 george sshd[30114]: Failed password for invalid user zmm from 196.1.97.216 port 42494 ssh2 Aug 28 08:08:02 george sshd[30150]: Invalid user nara from 196.1.97.216 port 34572 Aug 28 08:08:02 george sshd[30150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.97.216 Aug 28 08:08:04 george sshd[30150]: Failed password for invalid user nara from 196.1.97.216 port 34572 ssh2 ... |
2020-08-28 22:14:08 |
| 222.186.15.115 | attackbotsspam | Aug 28 16:06:00 abendstille sshd\[15252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115 user=root Aug 28 16:06:02 abendstille sshd\[15252\]: Failed password for root from 222.186.15.115 port 55659 ssh2 Aug 28 16:06:04 abendstille sshd\[15252\]: Failed password for root from 222.186.15.115 port 55659 ssh2 Aug 28 16:06:07 abendstille sshd\[15252\]: Failed password for root from 222.186.15.115 port 55659 ssh2 Aug 28 16:06:09 abendstille sshd\[15353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115 user=root ... |
2020-08-28 22:09:13 |
| 45.236.75.22 | attackbots | (smtpauth) Failed SMTP AUTH login from 45.236.75.22 (BR/Brazil/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-28 16:38:11 plain authenticator failed for ([45.236.75.22]) [45.236.75.22]: 535 Incorrect authentication data (set_id=info@atlaspumpsepahan.com) |
2020-08-28 22:00:04 |
| 5.9.151.57 | attackspambots | 20 attempts against mh-misbehave-ban on pluto |
2020-08-28 21:36:05 |
| 138.197.180.102 | attackbotsspam | 2020-08-28T17:52:28.682086paragon sshd[607007]: Failed password for root from 138.197.180.102 port 55516 ssh2 2020-08-28T17:56:06.842772paragon sshd[607308]: Invalid user wangjixin from 138.197.180.102 port 39144 2020-08-28T17:56:06.845376paragon sshd[607308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102 2020-08-28T17:56:06.842772paragon sshd[607308]: Invalid user wangjixin from 138.197.180.102 port 39144 2020-08-28T17:56:08.720729paragon sshd[607308]: Failed password for invalid user wangjixin from 138.197.180.102 port 39144 ssh2 ... |
2020-08-28 22:10:43 |
| 195.231.81.43 | attack | $f2bV_matches |
2020-08-28 22:03:15 |
| 222.186.42.155 | attackbotsspam | Aug 28 13:58:34 email sshd\[2908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155 user=root Aug 28 13:58:36 email sshd\[2908\]: Failed password for root from 222.186.42.155 port 23514 ssh2 Aug 28 13:58:45 email sshd\[2945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155 user=root Aug 28 13:58:47 email sshd\[2945\]: Failed password for root from 222.186.42.155 port 13538 ssh2 Aug 28 13:58:58 email sshd\[2980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155 user=root ... |
2020-08-28 22:06:33 |
| 181.143.122.18 | attack | port scan and connect, tcp 23 (telnet) |
2020-08-28 21:55:00 |
| 218.92.0.171 | attack | Aug 28 15:32:07 marvibiene sshd[24332]: Failed password for root from 218.92.0.171 port 17361 ssh2 Aug 28 15:32:12 marvibiene sshd[24332]: Failed password for root from 218.92.0.171 port 17361 ssh2 |
2020-08-28 22:05:00 |
| 217.12.213.64 | attackspam | Bruteforce detected by fail2ban |
2020-08-28 22:01:54 |
| 192.35.169.38 | attackspam | Port scan: Attack repeated for 24 hours |
2020-08-28 22:13:09 |
| 187.86.152.139 | attackbots | 2020-08-28 08:36:15.088528-0500 localhost sshd[41410]: Failed password for root from 187.86.152.139 port 47926 ssh2 |
2020-08-28 21:59:00 |
| 196.196.13.195 | attackspambots | Lines containing failures of 196.196.13.195 Aug 27 23:13:45 kopano sshd[11999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.196.13.195 user=r.r Aug 27 23:13:47 kopano sshd[11999]: Failed password for r.r from 196.196.13.195 port 43808 ssh2 Aug 27 23:13:47 kopano sshd[11999]: Received disconnect from 196.196.13.195 port 43808:11: Bye Bye [preauth] Aug 27 23:13:47 kopano sshd[11999]: Disconnected from authenticating user r.r 196.196.13.195 port 43808 [preauth] Aug 27 23:19:52 kopano sshd[12141]: Invalid user test2 from 196.196.13.195 port 52636 Aug 27 23:19:52 kopano sshd[12141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.196.13.195 Aug 27 23:19:55 kopano sshd[12141]: Failed password for invalid user test2 from 196.196.13.195 port 52636 ssh2 Aug 27 23:19:55 kopano sshd[12141]: Received disconnect from 196.196.13.195 port 52636:11: Bye Bye [preauth] Aug 27 23:19:55 kopano sshd[........ ------------------------------ |
2020-08-28 21:58:40 |