City: Waverly
Region: Ohio
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.145.6.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21000
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.145.6.239. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 08:45:26 CST 2025
;; MSG SIZE rcvd: 105
Host 239.6.145.66.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 239.6.145.66.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 167.99.164.211 | attackbotsspam | Dec 17 15:45:47 cp sshd[6816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.164.211 Dec 17 15:45:47 cp sshd[6816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.164.211 |
2019-12-17 22:55:48 |
| 96.78.177.242 | attackspam | Dec 17 16:15:34 ns381471 sshd[30197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.78.177.242 Dec 17 16:15:36 ns381471 sshd[30197]: Failed password for invalid user asif from 96.78.177.242 port 33316 ssh2 |
2019-12-17 23:28:16 |
| 118.27.15.68 | attack | Dec 17 15:19:58 game-panel sshd[4724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.15.68 Dec 17 15:20:00 game-panel sshd[4724]: Failed password for invalid user kemish from 118.27.15.68 port 60966 ssh2 Dec 17 15:26:43 game-panel sshd[5006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.15.68 |
2019-12-17 23:30:29 |
| 124.156.121.233 | attack | Dec 17 17:17:23 server sshd\[1270\]: Invalid user smmsp from 124.156.121.233 Dec 17 17:17:23 server sshd\[1270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.121.233 Dec 17 17:17:25 server sshd\[1270\]: Failed password for invalid user smmsp from 124.156.121.233 port 38164 ssh2 Dec 17 17:26:17 server sshd\[3886\]: Invalid user apolline from 124.156.121.233 Dec 17 17:26:17 server sshd\[3886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.121.233 ... |
2019-12-17 22:59:15 |
| 223.247.140.89 | attack | $f2bV_matches |
2019-12-17 23:21:30 |
| 201.182.32.189 | attackspam | Dec 17 06:10:49 uapps sshd[9711]: Address 201.182.32.189 maps to mail.unicaconsultores.com.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Dec 17 06:10:49 uapps sshd[9711]: User r.r from 201.182.32.189 not allowed because not listed in AllowUsers Dec 17 06:10:49 uapps sshd[9711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.32.189 user=r.r Dec 17 06:10:52 uapps sshd[9711]: Failed password for invalid user r.r from 201.182.32.189 port 45090 ssh2 Dec 17 06:10:52 uapps sshd[9711]: Received disconnect from 201.182.32.189: 11: Bye Bye [preauth] Dec 17 06:20:55 uapps sshd[9778]: Address 201.182.32.189 maps to mail.unicaconsultores.com.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT! Dec 17 06:20:55 uapps sshd[9778]: User r.r from 201.182.32.189 not allowed because not listed in AllowUsers Dec 17 06:20:55 uapps sshd[9778]: pam_unix(sshd:auth): authentication failure; lognam........ ------------------------------- |
2019-12-17 22:58:00 |
| 106.12.94.5 | attack | Repeated brute force against a port |
2019-12-17 23:26:52 |
| 171.237.130.231 | attackbots | 1576592767 - 12/17/2019 15:26:07 Host: 171.237.130.231/171.237.130.231 Port: 445 TCP Blocked |
2019-12-17 23:11:07 |
| 95.81.118.153 | attack | Dec 17 15:17:23 xxxxxxx0 sshd[30649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.81.118.153 user=r.r Dec 17 15:17:25 xxxxxxx0 sshd[30649]: Failed password for r.r from 95.81.118.153 port 35748 ssh2 Dec 17 15:17:27 xxxxxxx0 sshd[30649]: Failed password for r.r from 95.81.118.153 port 35748 ssh2 Dec 17 15:17:29 xxxxxxx0 sshd[30649]: Failed password for r.r from 95.81.118.153 port 35748 ssh2 Dec 17 15:17:32 xxxxxxx0 sshd[30649]: Failed password for r.r from 95.81.118.153 port 35748 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=95.81.118.153 |
2019-12-17 23:11:44 |
| 182.61.105.89 | attackspam | Dec 17 05:16:11 hanapaa sshd\[7909\]: Invalid user kristin from 182.61.105.89 Dec 17 05:16:11 hanapaa sshd\[7909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.89 Dec 17 05:16:13 hanapaa sshd\[7909\]: Failed password for invalid user kristin from 182.61.105.89 port 56852 ssh2 Dec 17 05:22:15 hanapaa sshd\[8519\]: Invalid user lydon from 182.61.105.89 Dec 17 05:22:15 hanapaa sshd\[8519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.89 |
2019-12-17 23:26:17 |
| 222.186.173.154 | attackbotsspam | Dec 17 14:49:17 zeus sshd[26255]: Failed password for root from 222.186.173.154 port 60508 ssh2 Dec 17 14:49:23 zeus sshd[26255]: Failed password for root from 222.186.173.154 port 60508 ssh2 Dec 17 14:49:28 zeus sshd[26255]: Failed password for root from 222.186.173.154 port 60508 ssh2 Dec 17 14:49:32 zeus sshd[26255]: Failed password for root from 222.186.173.154 port 60508 ssh2 Dec 17 14:49:37 zeus sshd[26255]: Failed password for root from 222.186.173.154 port 60508 ssh2 |
2019-12-17 22:55:25 |
| 67.199.254.216 | attack | Dec 16 15:04:27 newdogma sshd[31672]: Invalid user tamera from 67.199.254.216 port 52299 Dec 16 15:04:27 newdogma sshd[31672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.199.254.216 Dec 16 15:04:29 newdogma sshd[31672]: Failed password for invalid user tamera from 67.199.254.216 port 52299 ssh2 Dec 16 15:04:29 newdogma sshd[31672]: Received disconnect from 67.199.254.216 port 52299:11: Bye Bye [preauth] Dec 16 15:04:29 newdogma sshd[31672]: Disconnected from 67.199.254.216 port 52299 [preauth] Dec 16 15:09:53 newdogma sshd[31743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.199.254.216 user=r.r Dec 16 15:09:56 newdogma sshd[31743]: Failed password for r.r from 67.199.254.216 port 55255 ssh2 Dec 16 15:09:56 newdogma sshd[31743]: Received disconnect from 67.199.254.216 port 55255:11: Bye Bye [preauth] Dec 16 15:09:56 newdogma sshd[31743]: Disconnected from 67.199.254.216 port 5........ ------------------------------- |
2019-12-17 23:12:06 |
| 148.70.77.22 | attackbots | Dec 17 04:43:53 kapalua sshd\[582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.77.22 user=mysql Dec 17 04:43:55 kapalua sshd\[582\]: Failed password for mysql from 148.70.77.22 port 57784 ssh2 Dec 17 04:53:16 kapalua sshd\[1637\]: Invalid user khatereh from 148.70.77.22 Dec 17 04:53:16 kapalua sshd\[1637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.77.22 Dec 17 04:53:18 kapalua sshd\[1637\]: Failed password for invalid user khatereh from 148.70.77.22 port 37408 ssh2 |
2019-12-17 23:05:57 |
| 218.92.0.157 | attack | Dec 17 16:02:21 arianus sshd\[10412\]: Unable to negotiate with 218.92.0.157 port 64042: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\] ... |
2019-12-17 23:07:20 |
| 185.176.27.102 | attackspam | 12/17/2019-09:26:25.323058 185.176.27.102 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-12-17 22:53:05 |