City: Louisville
Region: Kentucky
Country: United States
Internet Service Provider: RTC Communications LLC
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.147.52.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.147.52.196. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 17:12:27 CST 2025
;; MSG SIZE rcvd: 106
196.52.147.66.in-addr.arpa domain name pointer nsc66.147.52-196.newsouth.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
196.52.147.66.in-addr.arpa name = nsc66.147.52-196.newsouth.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.13.201.158 | attackspam | Jun 6 13:49:19 pixelmemory sshd[3275546]: Failed password for root from 106.13.201.158 port 37162 ssh2 Jun 6 13:52:48 pixelmemory sshd[3286333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.201.158 user=root Jun 6 13:52:50 pixelmemory sshd[3286333]: Failed password for root from 106.13.201.158 port 57108 ssh2 Jun 6 13:56:17 pixelmemory sshd[3298883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.201.158 user=root Jun 6 13:56:19 pixelmemory sshd[3298883]: Failed password for root from 106.13.201.158 port 48820 ssh2 ... |
2020-06-07 04:57:57 |
| 72.37.138.194 | attackbotsspam | Unauthorized connection attempt from IP address 72.37.138.194 on Port 445(SMB) |
2020-06-07 05:09:01 |
| 162.243.145.30 | attackbots | Unauthorized connection attempt detected from IP address 162.243.145.30 to port 20 [T] |
2020-06-07 04:47:37 |
| 83.48.101.184 | attackspambots | 2020-06-06T19:15:47.375902abusebot-3.cloudsearch.cf sshd[12127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.red-83-48-101.staticip.rima-tde.net user=root 2020-06-06T19:15:49.276745abusebot-3.cloudsearch.cf sshd[12127]: Failed password for root from 83.48.101.184 port 26769 ssh2 2020-06-06T19:19:06.401620abusebot-3.cloudsearch.cf sshd[12316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.red-83-48-101.staticip.rima-tde.net user=root 2020-06-06T19:19:08.290006abusebot-3.cloudsearch.cf sshd[12316]: Failed password for root from 83.48.101.184 port 17773 ssh2 2020-06-06T19:22:28.100666abusebot-3.cloudsearch.cf sshd[12517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.red-83-48-101.staticip.rima-tde.net user=root 2020-06-06T19:22:29.715760abusebot-3.cloudsearch.cf sshd[12517]: Failed password for root from 83.48.101.184 port 17542 ssh2 2020-06-06T19 ... |
2020-06-07 04:49:27 |
| 42.233.248.44 | attackspambots | Jun 1 22:19:44 xxxx sshd[15289]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [42.233.248.44] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 1 22:19:44 xxxx sshd[15289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.233.248.44 user=r.r Jun 1 22:19:46 xxxx sshd[15289]: Failed password for r.r from 42.233.248.44 port 40344 ssh2 Jun 1 22:24:33 xxxx sshd[15298]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [42.233.248.44] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 1 22:24:33 xxxx sshd[15298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.233.248.44 user=r.r Jun 1 22:24:35 xxxx sshd[15298]: Failed password for r.r from 42.233.248.44 port 31630 ssh2 Jun 1 22:26:26 xxxx sshd[15300]: reveeclipse mapping checking getaddrinfo for hn.kd.ny.adsl [42.233.248.44] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 1 22:26:26 xxxx sshd[15300]: pam_unix(sshd:auth): authentication f........ ------------------------------- |
2020-06-07 04:42:52 |
| 118.70.133.226 | attack | Unauthorized connection attempt from IP address 118.70.133.226 on Port 445(SMB) |
2020-06-07 04:54:24 |
| 131.161.213.161 | attack | Unauthorized connection attempt from IP address 131.161.213.161 on Port 445(SMB) |
2020-06-07 05:00:02 |
| 54.37.14.3 | attackbots | Jun 6 22:38:55 localhost sshd\[21217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.14.3 user=root Jun 6 22:38:56 localhost sshd\[21217\]: Failed password for root from 54.37.14.3 port 57578 ssh2 Jun 6 22:42:21 localhost sshd\[21429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.14.3 user=root Jun 6 22:42:24 localhost sshd\[21429\]: Failed password for root from 54.37.14.3 port 60738 ssh2 Jun 6 22:45:52 localhost sshd\[21588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.14.3 user=root ... |
2020-06-07 04:58:53 |
| 160.16.208.139 | attackspam | michaelklotzbier.de 160.16.208.139 [06/Jun/2020:22:45:46 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4257 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" MICHAELKLOTZBIER.DE 160.16.208.139 [06/Jun/2020:22:45:46 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4257 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" |
2020-06-07 05:07:27 |
| 103.243.252.20 | attackbots | Jun 7 06:38:05 web1 sshd[20514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.252.20 user=root Jun 7 06:38:07 web1 sshd[20514]: Failed password for root from 103.243.252.20 port 49710 ssh2 Jun 7 06:45:23 web1 sshd[22332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.252.20 user=root Jun 7 06:45:25 web1 sshd[22332]: Failed password for root from 103.243.252.20 port 37442 ssh2 Jun 7 06:50:06 web1 sshd[23497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.252.20 user=root Jun 7 06:50:08 web1 sshd[23497]: Failed password for root from 103.243.252.20 port 55036 ssh2 Jun 7 06:55:42 web1 sshd[24929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.252.20 user=root Jun 7 06:55:44 web1 sshd[24929]: Failed password for root from 103.243.252.20 port 44428 ssh2 Jun 7 07:00:53 web1 sshd[26 ... |
2020-06-07 05:02:36 |
| 14.161.16.70 | attackspambots | Unauthorized connection attempt from IP address 14.161.16.70 on Port 445(SMB) |
2020-06-07 05:04:25 |
| 49.233.173.154 | attackbots | Jun 6 23:11:30 journals sshd\[12252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.173.154 user=root Jun 6 23:11:32 journals sshd\[12252\]: Failed password for root from 49.233.173.154 port 34258 ssh2 Jun 6 23:15:17 journals sshd\[12684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.173.154 user=root Jun 6 23:15:19 journals sshd\[12684\]: Failed password for root from 49.233.173.154 port 50546 ssh2 Jun 6 23:19:00 journals sshd\[13048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.173.154 user=root ... |
2020-06-07 04:47:56 |
| 165.22.35.21 | attack | 165.22.35.21 - - [06/Jun/2020:17:54:14 +0200] "GET /wp-login.php HTTP/1.1" 200 6183 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 165.22.35.21 - - [06/Jun/2020:17:54:15 +0200] "POST /wp-login.php HTTP/1.1" 200 6434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 165.22.35.21 - - [06/Jun/2020:17:54:16 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-06-07 04:43:11 |
| 14.29.217.55 | attack | Jun 6 22:58:09 PorscheCustomer sshd[17788]: Failed password for root from 14.29.217.55 port 46647 ssh2 Jun 6 23:01:15 PorscheCustomer sshd[17864]: Failed password for root from 14.29.217.55 port 34984 ssh2 ... |
2020-06-07 05:11:42 |
| 193.112.216.235 | attackspambots | Jun 6 17:18:12 prox sshd[30766]: Failed password for root from 193.112.216.235 port 45728 ssh2 |
2020-06-07 04:45:23 |