City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 63.69.145.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36729
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;63.69.145.13. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 07:27:15 CST 2025
;; MSG SIZE rcvd: 105
Host 13.145.69.63.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 13.145.69.63.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 82.55.69.50 | attackspambots | (sshd) Failed SSH login from 82.55.69.50 (IT/Italy/Provincia di Macerata/Recanati/host50-69-dynamic.55-82-r.retail.telecomitalia.it/[AS3269 Telecom Italia]): 1 in the last 3600 secs |
2019-11-03 14:11:35 |
| 211.143.246.38 | attackspambots | Nov 3 06:53:24 lnxweb62 sshd[11314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.246.38 Nov 3 06:53:24 lnxweb62 sshd[11314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.246.38 |
2019-11-03 13:55:05 |
| 118.89.249.95 | attackspam | Nov 3 06:44:31 vps666546 sshd\[32456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.249.95 user=root Nov 3 06:44:33 vps666546 sshd\[32456\]: Failed password for root from 118.89.249.95 port 55332 ssh2 Nov 3 06:49:28 vps666546 sshd\[32529\]: Invalid user confluence from 118.89.249.95 port 34258 Nov 3 06:49:28 vps666546 sshd\[32529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.249.95 Nov 3 06:49:29 vps666546 sshd\[32529\]: Failed password for invalid user confluence from 118.89.249.95 port 34258 ssh2 ... |
2019-11-03 13:52:02 |
| 5.196.75.178 | attackspambots | Nov 3 05:19:40 game-panel sshd[21612]: Failed password for root from 5.196.75.178 port 38418 ssh2 Nov 3 05:24:56 game-panel sshd[21857]: Failed password for root from 5.196.75.178 port 53864 ssh2 |
2019-11-03 13:49:53 |
| 222.186.175.169 | attack | $f2bV_matches_ltvn |
2019-11-03 14:09:09 |
| 178.128.114.248 | attackbots | " " |
2019-11-03 14:16:19 |
| 222.82.250.4 | attackspam | Nov 3 06:47:05 SilenceServices sshd[31628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.250.4 Nov 3 06:47:07 SilenceServices sshd[31628]: Failed password for invalid user 123456 from 222.82.250.4 port 53225 ssh2 Nov 3 06:53:20 SilenceServices sshd[3398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.250.4 |
2019-11-03 14:22:02 |
| 163.172.110.45 | attackbotsspam | Nov 3 06:29:36 localhost sshd\[23308\]: Invalid user owdi from 163.172.110.45 port 60356 Nov 3 06:29:36 localhost sshd\[23308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.110.45 Nov 3 06:29:38 localhost sshd\[23308\]: Failed password for invalid user owdi from 163.172.110.45 port 60356 ssh2 |
2019-11-03 13:47:38 |
| 125.130.110.20 | attack | 2019-11-03T05:24:42.851274hub.schaetter.us sshd\[30181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20 user=root 2019-11-03T05:24:44.669313hub.schaetter.us sshd\[30181\]: Failed password for root from 125.130.110.20 port 34858 ssh2 2019-11-03T05:28:43.450141hub.schaetter.us sshd\[30189\]: Invalid user sonny from 125.130.110.20 port 49780 2019-11-03T05:28:43.459584hub.schaetter.us sshd\[30189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20 2019-11-03T05:28:46.030186hub.schaetter.us sshd\[30189\]: Failed password for invalid user sonny from 125.130.110.20 port 49780 ssh2 ... |
2019-11-03 14:22:49 |
| 118.24.173.104 | attackbotsspam | Nov 3 06:43:40 MK-Soft-VM5 sshd[32429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.173.104 Nov 3 06:43:42 MK-Soft-VM5 sshd[32429]: Failed password for invalid user dang from 118.24.173.104 port 48763 ssh2 ... |
2019-11-03 14:04:35 |
| 13.52.125.12 | attackbots | Nov 3 06:25:14 localhost sshd\[31576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.52.125.12 user=root Nov 3 06:25:16 localhost sshd\[31576\]: Failed password for root from 13.52.125.12 port 55600 ssh2 Nov 3 06:29:01 localhost sshd\[32238\]: Invalid user carlos from 13.52.125.12 Nov 3 06:29:01 localhost sshd\[32238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.52.125.12 Nov 3 06:29:03 localhost sshd\[32238\]: Failed password for invalid user carlos from 13.52.125.12 port 36916 ssh2 ... |
2019-11-03 14:14:02 |
| 112.21.191.253 | attack | Nov 3 06:29:12 nextcloud sshd\[31174\]: Invalid user shrikrishna from 112.21.191.253 Nov 3 06:29:12 nextcloud sshd\[31174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.191.253 Nov 3 06:29:14 nextcloud sshd\[31174\]: Failed password for invalid user shrikrishna from 112.21.191.253 port 36999 ssh2 ... |
2019-11-03 14:06:23 |
| 212.64.28.77 | attackbotsspam | Nov 3 06:28:42 lnxded64 sshd[31334]: Failed password for root from 212.64.28.77 port 38832 ssh2 Nov 3 06:28:42 lnxded64 sshd[31334]: Failed password for root from 212.64.28.77 port 38832 ssh2 |
2019-11-03 14:24:57 |
| 222.186.175.217 | attack | Nov 3 08:52:40 server sshd\[30111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217 user=root Nov 3 08:52:41 server sshd\[30120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217 user=root Nov 3 08:52:41 server sshd\[30119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217 user=root Nov 3 08:52:41 server sshd\[30111\]: Failed password for root from 222.186.175.217 port 14872 ssh2 Nov 3 08:52:43 server sshd\[30120\]: Failed password for root from 222.186.175.217 port 9134 ssh2 ... |
2019-11-03 14:15:31 |
| 49.234.115.143 | attackbots | Nov 3 02:25:25 firewall sshd[23595]: Failed password for invalid user hh from 49.234.115.143 port 45646 ssh2 Nov 3 02:29:16 firewall sshd[23694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.115.143 user=root Nov 3 02:29:18 firewall sshd[23694]: Failed password for root from 49.234.115.143 port 48096 ssh2 ... |
2019-11-03 14:02:40 |