City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.29.249.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;55.29.249.138. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 14:13:51 CST 2025
;; MSG SIZE rcvd: 106
Host 138.249.29.55.in-addr.arpa not found: 2(SERVFAIL)
server can't find 55.29.249.138.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
45.141.84.29 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 26 - port: 3400 proto: TCP cat: Misc Attack |
2020-04-05 14:21:11 |
111.229.121.142 | attack | $f2bV_matches |
2020-04-05 14:18:24 |
51.158.120.115 | attackbots | Apr 5 07:42:58 santamaria sshd\[5032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.120.115 user=root Apr 5 07:43:00 santamaria sshd\[5032\]: Failed password for root from 51.158.120.115 port 35190 ssh2 Apr 5 07:46:41 santamaria sshd\[5110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.120.115 user=root ... |
2020-04-05 14:27:39 |
222.186.175.182 | attackbots | DATE:2020-04-05 08:35:03, IP:222.186.175.182, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq) |
2020-04-05 14:35:40 |
178.128.191.43 | attackspambots | SSH Brute Force |
2020-04-05 13:53:25 |
42.2.182.76 | attack | Unauthorized connection attempt detected from IP address 42.2.182.76 to port 5555 |
2020-04-05 14:01:52 |
180.97.4.244 | attack | 04/04/2020-23:55:52.994619 180.97.4.244 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-04-05 14:20:54 |
43.226.145.213 | attack | Apr 5 07:50:45 legacy sshd[27823]: Failed password for root from 43.226.145.213 port 40394 ssh2 Apr 5 07:55:56 legacy sshd[27930]: Failed password for root from 43.226.145.213 port 39616 ssh2 ... |
2020-04-05 14:01:16 |
37.59.224.39 | attack | SSH Brute Force |
2020-04-05 14:08:05 |
218.92.0.199 | attackbotsspam | Apr 5 07:49:02 legacy sshd[27722]: Failed password for root from 218.92.0.199 port 57209 ssh2 Apr 5 07:49:04 legacy sshd[27722]: Failed password for root from 218.92.0.199 port 57209 ssh2 Apr 5 07:49:07 legacy sshd[27722]: Failed password for root from 218.92.0.199 port 57209 ssh2 ... |
2020-04-05 14:09:10 |
104.245.144.235 | attackspambots | (From evie.taormina@gmail.com) Would you be interested in an advertising service that charges less than $50 monthly and sends tons of people who are ready to buy directly to your website? Have a look at: http://www.trafficmasters.xyz |
2020-04-05 14:18:55 |
138.91.10.92 | attack | 138.91.10.92 - - - [05/Apr/2020:03:56:25 +0000] "GET /wp-includes/wlwmanifest.xml HTTP/1.1" 404 564 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" "-" "-" |
2020-04-05 13:53:52 |
101.50.126.96 | attackspambots | Apr 4 22:53:34 server sshd\[3515\]: Failed password for root from 101.50.126.96 port 37792 ssh2 Apr 5 08:40:27 server sshd\[29922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.50.126.96 user=root Apr 5 08:40:29 server sshd\[29922\]: Failed password for root from 101.50.126.96 port 38018 ssh2 Apr 5 08:55:19 server sshd\[1287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.50.126.96 user=root Apr 5 08:55:21 server sshd\[1287\]: Failed password for root from 101.50.126.96 port 54906 ssh2 ... |
2020-04-05 14:20:30 |
179.33.137.117 | attack | Apr 5 07:04:13 mail sshd[12851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.33.137.117 user=root Apr 5 07:04:16 mail sshd[12851]: Failed password for root from 179.33.137.117 port 47958 ssh2 Apr 5 07:13:30 mail sshd[27282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.33.137.117 user=root Apr 5 07:13:32 mail sshd[27282]: Failed password for root from 179.33.137.117 port 43632 ssh2 Apr 5 07:16:51 mail sshd[32573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.33.137.117 user=root Apr 5 07:16:53 mail sshd[32573]: Failed password for root from 179.33.137.117 port 56684 ssh2 ... |
2020-04-05 14:35:58 |
180.128.8.6 | attack | Apr 5 04:44:42 sshgateway sshd\[21258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.128.8.6 user=root Apr 5 04:44:44 sshgateway sshd\[21258\]: Failed password for root from 180.128.8.6 port 34320 ssh2 Apr 5 04:50:19 sshgateway sshd\[21306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.128.8.6 user=root |
2020-04-05 14:09:30 |