City: San Jose
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.141.2.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30516
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;57.141.2.20. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062500 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 25 15:23:00 CST 2025
;; MSG SIZE rcvd: 104
Host 20.2.141.57.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 20.2.141.57.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 58.57.4.238 | attackbotsspam | Multiple failed SASL logins |
2020-10-07 20:32:06 |
| 175.193.13.3 | attackbotsspam | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-10-07 20:18:21 |
| 216.155.94.51 | attack |
|
2020-10-07 20:26:13 |
| 236.253.88.46 | attack | Hi |
2020-10-07 20:49:35 |
| 220.78.28.68 | attack | SSH bruteforce |
2020-10-07 20:44:35 |
| 200.199.227.195 | attackspambots | Oct 7 14:07:12 raspberrypi sshd[3716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.199.227.195 user=root Oct 7 14:07:14 raspberrypi sshd[3716]: Failed password for invalid user root from 200.199.227.195 port 55308 ssh2 ... |
2020-10-07 20:23:00 |
| 106.75.139.131 | attack | Oct 7 11:19:41 dhoomketu sshd[3625984]: Failed password for root from 106.75.139.131 port 40808 ssh2 Oct 7 11:21:25 dhoomketu sshd[3626010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.139.131 user=root Oct 7 11:21:26 dhoomketu sshd[3626010]: Failed password for root from 106.75.139.131 port 57422 ssh2 Oct 7 11:23:06 dhoomketu sshd[3626061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.139.131 user=root Oct 7 11:23:08 dhoomketu sshd[3626061]: Failed password for root from 106.75.139.131 port 45804 ssh2 ... |
2020-10-07 20:38:21 |
| 218.92.0.248 | attack | 2020-10-07T15:21:00.071458snf-827550 sshd[25427]: Failed password for root from 218.92.0.248 port 11462 ssh2 2020-10-07T15:21:04.065768snf-827550 sshd[25427]: Failed password for root from 218.92.0.248 port 11462 ssh2 2020-10-07T15:21:07.622852snf-827550 sshd[25427]: Failed password for root from 218.92.0.248 port 11462 ssh2 ... |
2020-10-07 20:21:56 |
| 203.66.168.81 | attackbots | 203.66.168.81 (TW/Taiwan/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 7 06:06:48 server2 sshd[27697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.27.19.222 user=root Oct 7 06:06:50 server2 sshd[27697]: Failed password for root from 36.27.19.222 port 54913 ssh2 Oct 7 06:06:50 server2 sshd[27702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.199.118.195 user=root Oct 7 06:06:52 server2 sshd[27702]: Failed password for root from 112.199.118.195 port 63131 ssh2 Oct 7 06:06:37 server2 sshd[27685]: Failed password for root from 51.77.230.49 port 58370 ssh2 Oct 7 06:07:25 server2 sshd[28064]: Failed password for root from 203.66.168.81 port 51330 ssh2 IP Addresses Blocked: 36.27.19.222 (CN/China/-) 112.199.118.195 (PH/Philippines/-) 51.77.230.49 (FR/France/-) |
2020-10-07 20:36:36 |
| 139.155.35.220 | attackbots | leo_www |
2020-10-07 20:19:57 |
| 212.70.149.52 | attackspambots | Oct 7 14:16:50 srv01 postfix/smtpd\[31341\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 7 14:16:53 srv01 postfix/smtpd\[29602\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 7 14:16:57 srv01 postfix/smtpd\[22435\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 7 14:16:59 srv01 postfix/smtpd\[27691\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 7 14:17:16 srv01 postfix/smtpd\[31341\]: warning: unknown\[212.70.149.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-07 20:22:22 |
| 66.249.69.253 | attackspam | IP 66.249.69.253 attacked honeypot on port: 80 at 10/6/2020 1:44:37 PM |
2020-10-07 20:53:13 |
| 236.253.88.46 | spambotsattackproxynormal | Hi |
2020-10-07 20:49:56 |
| 82.212.123.143 | attackspam | Automatic report - Port Scan Attack |
2020-10-07 20:21:39 |
| 45.230.80.13 | attack | Autoban 45.230.80.13 AUTH/CONNECT |
2020-10-07 20:24:36 |