City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.94.201.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15934
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;56.94.201.50. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:09:47 CST 2025
;; MSG SIZE rcvd: 105
Host 50.201.94.56.in-addr.arpa not found: 2(SERVFAIL)
server can't find 56.94.201.50.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.42.117 | attack | Aug 27 04:17:31 Ubuntu-1404-trusty-64-minimal sshd\[2670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.117 user=root Aug 27 04:17:33 Ubuntu-1404-trusty-64-minimal sshd\[2670\]: Failed password for root from 222.186.42.117 port 12332 ssh2 Aug 27 04:17:42 Ubuntu-1404-trusty-64-minimal sshd\[2695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.117 user=root Aug 27 04:17:43 Ubuntu-1404-trusty-64-minimal sshd\[2695\]: Failed password for root from 222.186.42.117 port 61164 ssh2 Aug 27 04:17:56 Ubuntu-1404-trusty-64-minimal sshd\[2807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.117 user=root |
2019-08-27 10:22:04 |
| 165.22.143.139 | attack | Aug 27 00:44:08 ns315508 sshd[3594]: Invalid user simple from 165.22.143.139 port 50418 Aug 27 00:44:08 ns315508 sshd[3594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.143.139 Aug 27 00:44:08 ns315508 sshd[3594]: Invalid user simple from 165.22.143.139 port 50418 Aug 27 00:44:11 ns315508 sshd[3594]: Failed password for invalid user simple from 165.22.143.139 port 50418 ssh2 Aug 27 00:48:07 ns315508 sshd[3618]: Invalid user andres from 165.22.143.139 port 38864 ... |
2019-08-27 09:56:15 |
| 162.247.72.199 | attackspam | Aug 27 03:48:13 tux-35-217 sshd\[3112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.72.199 user=sshd Aug 27 03:48:15 tux-35-217 sshd\[3112\]: Failed password for sshd from 162.247.72.199 port 43662 ssh2 Aug 27 03:48:16 tux-35-217 sshd\[3112\]: Failed password for sshd from 162.247.72.199 port 43662 ssh2 Aug 27 03:48:19 tux-35-217 sshd\[3112\]: Failed password for sshd from 162.247.72.199 port 43662 ssh2 ... |
2019-08-27 09:50:47 |
| 182.61.55.239 | attackspambots | Aug 27 03:44:16 lnxweb62 sshd[3653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.55.239 |
2019-08-27 09:55:43 |
| 112.13.91.29 | attackspambots | Aug 26 15:36:11 hanapaa sshd\[14253\]: Invalid user wind from 112.13.91.29 Aug 26 15:36:11 hanapaa sshd\[14253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.13.91.29 Aug 26 15:36:13 hanapaa sshd\[14253\]: Failed password for invalid user wind from 112.13.91.29 port 2963 ssh2 Aug 26 15:40:24 hanapaa sshd\[14716\]: Invalid user main from 112.13.91.29 Aug 26 15:40:24 hanapaa sshd\[14716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.13.91.29 |
2019-08-27 09:51:35 |
| 119.4.13.52 | attackbotsspam | 2019-08-27T03:31:05.721461 sshd[19195]: Invalid user brian from 119.4.13.52 port 55893 2019-08-27T03:31:05.736113 sshd[19195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.13.52 2019-08-27T03:31:05.721461 sshd[19195]: Invalid user brian from 119.4.13.52 port 55893 2019-08-27T03:31:07.633181 sshd[19195]: Failed password for invalid user brian from 119.4.13.52 port 55893 ssh2 2019-08-27T03:38:21.377773 sshd[19304]: Invalid user user from 119.4.13.52 port 50267 ... |
2019-08-27 09:46:50 |
| 180.166.192.66 | attackbotsspam | Aug 27 02:02:00 localhost sshd\[3786\]: Invalid user python from 180.166.192.66 port 13763 Aug 27 02:02:00 localhost sshd\[3786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.192.66 Aug 27 02:02:02 localhost sshd\[3786\]: Failed password for invalid user python from 180.166.192.66 port 13763 ssh2 Aug 27 02:06:09 localhost sshd\[3912\]: Invalid user agylis from 180.166.192.66 port 60084 Aug 27 02:06:09 localhost sshd\[3912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.192.66 ... |
2019-08-27 10:25:31 |
| 175.170.16.75 | attack | Unauthorised access (Aug 27) SRC=175.170.16.75 LEN=40 TTL=49 ID=14832 TCP DPT=8080 WINDOW=54030 SYN Unauthorised access (Aug 27) SRC=175.170.16.75 LEN=40 TTL=49 ID=10797 TCP DPT=8080 WINDOW=43103 SYN |
2019-08-27 10:11:43 |
| 193.32.160.139 | attack | MagicSpam Rule: Excessive Mail Rate Inbound; Spammer IP: 193.32.160.139 |
2019-08-27 10:09:58 |
| 62.210.105.116 | attackspam | Aug 27 04:06:37 host sshd\[15192\]: Failed password for sshd from 62.210.105.116 port 38411 ssh2 Aug 27 04:06:40 host sshd\[15192\]: Failed password for sshd from 62.210.105.116 port 38411 ssh2 ... |
2019-08-27 10:10:39 |
| 14.161.16.62 | attack | Aug 27 01:44:12 MK-Soft-VM7 sshd\[3433\]: Invalid user helena from 14.161.16.62 port 49070 Aug 27 01:44:12 MK-Soft-VM7 sshd\[3433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.16.62 Aug 27 01:44:14 MK-Soft-VM7 sshd\[3433\]: Failed password for invalid user helena from 14.161.16.62 port 49070 ssh2 ... |
2019-08-27 10:15:32 |
| 193.169.255.102 | attackbotsspam | Aug 27 02:32:17 MK-Soft-VM3 sshd\[5211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.255.102 user=sshd Aug 27 02:32:19 MK-Soft-VM3 sshd\[5211\]: Failed password for sshd from 193.169.255.102 port 58834 ssh2 Aug 27 02:32:22 MK-Soft-VM3 sshd\[5211\]: Failed password for sshd from 193.169.255.102 port 58834 ssh2 ... |
2019-08-27 10:36:05 |
| 177.196.54.94 | attackbots | firewall-block, port(s): 22/tcp |
2019-08-27 10:04:20 |
| 91.23.33.246 | attackspam | Automatic report |
2019-08-27 09:59:58 |
| 216.211.245.95 | attack | SSH Brute Force, server-1 sshd[10797]: Failed password for invalid user gspanos from 216.211.245.95 port 57146 ssh2 |
2019-08-27 10:17:23 |