City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.114.38.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50892
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;55.114.38.30. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 11:48:35 CST 2025
;; MSG SIZE rcvd: 105
Host 30.38.114.55.in-addr.arpa not found: 2(SERVFAIL)
server can't find 55.114.38.30.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 182.61.138.203 | attack | IP blocked |
2020-05-22 12:01:37 |
| 213.217.0.133 | attackspam | May 22 02:39:09 debian-2gb-nbg1-2 kernel: \[12366769.065319\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=213.217.0.133 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=51344 PROTO=TCP SPT=53560 DPT=61746 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-22 08:48:56 |
| 177.140.72.165 | attackbotsspam | techno.ws 177.140.72.165 [22/May/2020:05:59:30 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4246 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36" techno.ws 177.140.72.165 [22/May/2020:05:59:33 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4246 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36" |
2020-05-22 12:13:41 |
| 51.15.190.82 | attackspambots | May 22 02:37:18 ovpn sshd\[9391\]: Invalid user hikari from 51.15.190.82 May 22 02:37:18 ovpn sshd\[9391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.190.82 May 22 02:37:20 ovpn sshd\[9391\]: Failed password for invalid user hikari from 51.15.190.82 port 45474 ssh2 May 22 02:39:14 ovpn sshd\[9858\]: Invalid user ntps from 51.15.190.82 May 22 02:39:14 ovpn sshd\[9858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.190.82 |
2020-05-22 08:54:42 |
| 182.61.64.212 | attackbotsspam | May 22 05:51:12 rotator sshd\[22456\]: Invalid user vlx from 182.61.64.212May 22 05:51:14 rotator sshd\[22456\]: Failed password for invalid user vlx from 182.61.64.212 port 51878 ssh2May 22 05:55:24 rotator sshd\[23232\]: Invalid user sov from 182.61.64.212May 22 05:55:26 rotator sshd\[23232\]: Failed password for invalid user sov from 182.61.64.212 port 57332 ssh2May 22 05:59:34 rotator sshd\[23254\]: Invalid user uais533 from 182.61.64.212May 22 05:59:36 rotator sshd\[23254\]: Failed password for invalid user uais533 from 182.61.64.212 port 34542 ssh2 ... |
2020-05-22 12:10:33 |
| 125.69.68.125 | attackspam | Invalid user mxz from 125.69.68.125 port 16314 |
2020-05-22 08:38:41 |
| 152.136.45.81 | attackbotsspam | 2020-05-21T23:05:11.320169server.espacesoutien.com sshd[4892]: Invalid user ujq from 152.136.45.81 port 47100 2020-05-21T23:05:11.334802server.espacesoutien.com sshd[4892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.45.81 2020-05-21T23:05:11.320169server.espacesoutien.com sshd[4892]: Invalid user ujq from 152.136.45.81 port 47100 2020-05-21T23:05:13.683845server.espacesoutien.com sshd[4892]: Failed password for invalid user ujq from 152.136.45.81 port 47100 ssh2 ... |
2020-05-22 08:53:22 |
| 165.22.107.105 | attack | May 22 00:54:18 firewall sshd[2956]: Invalid user vct from 165.22.107.105 May 22 00:54:20 firewall sshd[2956]: Failed password for invalid user vct from 165.22.107.105 port 33596 ssh2 May 22 00:59:44 firewall sshd[3124]: Invalid user wxw from 165.22.107.105 ... |
2020-05-22 12:05:37 |
| 123.207.185.54 | attackspam | May 21 22:41:12 piServer sshd[11008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.185.54 May 21 22:41:14 piServer sshd[11008]: Failed password for invalid user gas from 123.207.185.54 port 41538 ssh2 May 21 22:51:03 piServer sshd[11761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.185.54 ... |
2020-05-22 08:45:32 |
| 218.92.0.200 | attack | May 22 02:26:45 pve1 sshd[9109]: Failed password for root from 218.92.0.200 port 48647 ssh2 May 22 02:26:49 pve1 sshd[9109]: Failed password for root from 218.92.0.200 port 48647 ssh2 ... |
2020-05-22 08:57:52 |
| 129.28.169.185 | attackspam | May 22 00:17:28 mailserver sshd\[4232\]: Invalid user fut from 129.28.169.185 ... |
2020-05-22 08:55:50 |
| 101.231.135.146 | attackspam | May 22 02:19:05 vps sshd[81240]: Failed password for invalid user uom from 101.231.135.146 port 53232 ssh2 May 22 02:23:59 vps sshd[104498]: Invalid user idy from 101.231.135.146 port 56018 May 22 02:23:59 vps sshd[104498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.135.146 May 22 02:24:01 vps sshd[104498]: Failed password for invalid user idy from 101.231.135.146 port 56018 ssh2 May 22 02:28:22 vps sshd[125826]: Invalid user scj from 101.231.135.146 port 58788 ... |
2020-05-22 08:38:54 |
| 211.23.125.95 | attack | May 22 01:27:06 cdc sshd[4429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.23.125.95 May 22 01:27:08 cdc sshd[4429]: Failed password for invalid user yl from 211.23.125.95 port 34704 ssh2 |
2020-05-22 09:00:00 |
| 51.68.123.198 | attackspam | May 22 00:17:07 ourumov-web sshd\[565\]: Invalid user png from 51.68.123.198 port 54836 May 22 00:17:07 ourumov-web sshd\[565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.123.198 May 22 00:17:09 ourumov-web sshd\[565\]: Failed password for invalid user png from 51.68.123.198 port 54836 ssh2 ... |
2020-05-22 08:52:24 |
| 203.159.249.215 | attackbotsspam | May 22 00:24:28 ArkNodeAT sshd\[22044\]: Invalid user et from 203.159.249.215 May 22 00:24:28 ArkNodeAT sshd\[22044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.159.249.215 May 22 00:24:30 ArkNodeAT sshd\[22044\]: Failed password for invalid user et from 203.159.249.215 port 34030 ssh2 |
2020-05-22 09:04:56 |