City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.2.99.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63069
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;57.2.99.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 04:03:48 CST 2025
;; MSG SIZE rcvd: 104
Host 139.99.2.57.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.99.2.57.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 119.160.234.37 | attackbotsspam | Port 1433 Scan |
2020-02-12 04:38:44 |
| 112.85.42.174 | attackspambots | Feb 11 20:00:30 124388 sshd[6748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174 user=root Feb 11 20:00:32 124388 sshd[6748]: Failed password for root from 112.85.42.174 port 26854 ssh2 Feb 11 20:00:47 124388 sshd[6748]: error: maximum authentication attempts exceeded for root from 112.85.42.174 port 26854 ssh2 [preauth] Feb 11 20:00:51 124388 sshd[6750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174 user=root Feb 11 20:00:53 124388 sshd[6750]: Failed password for root from 112.85.42.174 port 59998 ssh2 |
2020-02-12 04:26:18 |
| 91.225.163.157 | attackspam | Feb 11 14:37:52 seraph sshd[14168]: Did not receive identification string f= rom 91.225.163.157 Feb 11 14:38:40 seraph sshd[14183]: Invalid user user from 91.225.163.157 Feb 11 14:38:42 seraph sshd[14183]: pam_unix(sshd:auth): authentication fai= lure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D91.225.163.157 Feb 11 14:38:44 seraph sshd[14183]: Failed password for invalid user user f= rom 91.225.163.157 port 50659 ssh2 Feb 11 14:38:44 seraph sshd[14183]: Connection closed by 91.225.163.157 por= t 50659 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=91.225.163.157 |
2020-02-12 04:04:13 |
| 82.196.4.66 | attack | Feb 11 14:41:18 pornomens sshd\[28640\]: Invalid user hxd from 82.196.4.66 port 54632 Feb 11 14:41:18 pornomens sshd\[28640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.4.66 Feb 11 14:41:20 pornomens sshd\[28640\]: Failed password for invalid user hxd from 82.196.4.66 port 54632 ssh2 ... |
2020-02-12 04:16:20 |
| 189.7.81.29 | attackbots | Feb 11 13:54:20 vps46666688 sshd[28887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.81.29 Feb 11 13:54:23 vps46666688 sshd[28887]: Failed password for invalid user gmj from 189.7.81.29 port 36886 ssh2 ... |
2020-02-12 04:25:18 |
| 118.25.25.207 | attackspam | Feb 11 10:42:16 main sshd[9399]: Failed password for invalid user ooa from 118.25.25.207 port 46832 ssh2 |
2020-02-12 04:03:17 |
| 117.200.75.23 | attackspambots | Invalid user wvq from 117.200.75.23 port 43073 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.200.75.23 Failed password for invalid user wvq from 117.200.75.23 port 43073 ssh2 Invalid user sio from 117.200.75.23 port 10881 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.200.75.23 |
2020-02-12 04:03:48 |
| 41.78.75.45 | attackbots | 2020-02-11T19:54:21.427012matrix.arvenenaske.de sshd[1022823]: Invalid user sherbak from 41.78.75.45 port 30696 2020-02-11T19:54:21.430543matrix.arvenenaske.de sshd[1022823]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.78.75.45 user=sherbak 2020-02-11T19:54:21.431075matrix.arvenenaske.de sshd[1022823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.78.75.45 2020-02-11T19:54:21.427012matrix.arvenenaske.de sshd[1022823]: Invalid user sherbak from 41.78.75.45 port 30696 2020-02-11T19:54:23.819589matrix.arvenenaske.de sshd[1022823]: Failed password for invalid user sherbak from 41.78.75.45 port 30696 ssh2 2020-02-11T19:57:26.350535matrix.arvenenaske.de sshd[1022833]: Invalid user ke from 41.78.75.45 port 25773 2020-02-11T19:57:26.355217matrix.arvenenaske.de sshd[1022833]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.78.75.45 user=ke 2020-02-1........ ------------------------------ |
2020-02-12 04:08:46 |
| 54.36.131.232 | attackbotsspam | firewall-block, port(s): 5060/udp |
2020-02-12 04:35:10 |
| 222.186.190.17 | attackspam | Feb 11 19:42:50 ip-172-31-62-245 sshd\[10898\]: Failed password for root from 222.186.190.17 port 19324 ssh2\ Feb 11 19:44:46 ip-172-31-62-245 sshd\[10906\]: Failed password for root from 222.186.190.17 port 54402 ssh2\ Feb 11 19:46:01 ip-172-31-62-245 sshd\[10915\]: Failed password for root from 222.186.190.17 port 19659 ssh2\ Feb 11 19:47:16 ip-172-31-62-245 sshd\[10921\]: Failed password for root from 222.186.190.17 port 41873 ssh2\ Feb 11 19:48:31 ip-172-31-62-245 sshd\[10929\]: Failed password for root from 222.186.190.17 port 10856 ssh2\ |
2020-02-12 04:30:23 |
| 36.71.235.37 | attack | Automatic report - SSH Brute-Force Attack |
2020-02-12 04:24:30 |
| 43.230.159.124 | attackspam | 1581428509 - 02/11/2020 14:41:49 Host: 43.230.159.124/43.230.159.124 Port: 445 TCP Blocked |
2020-02-12 04:04:27 |
| 41.89.226.3 | attackspambots | Unauthorised access (Feb 11) SRC=41.89.226.3 LEN=60 TTL=114 ID=13840 DF TCP DPT=445 WINDOW=8192 SYN |
2020-02-12 04:16:02 |
| 115.54.104.237 | attackbots | Port probing on unauthorized port 23 |
2020-02-12 04:10:41 |
| 5.103.29.38 | attackbotsspam | Brute-force attempt banned |
2020-02-12 04:14:42 |