City: Lubbock
Region: Texas
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: Texas Tech University Health Sciences Center
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.230.52.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51609
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.230.52.165. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019062201 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 22 17:52:51 CST 2019
;; MSG SIZE rcvd: 117
Host 165.52.230.66.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 165.52.230.66.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
46.244.71.237 | attackspambots | 1597031747 - 08/10/2020 05:55:47 Host: 46.244.71.237/46.244.71.237 Port: 8080 TCP Blocked |
2020-08-10 13:15:50 |
107.170.113.190 | attackspambots | Bruteforce detected by fail2ban |
2020-08-10 13:09:25 |
218.92.0.212 | attackbots | Aug 10 06:53:43 * sshd[25282]: Failed password for root from 218.92.0.212 port 3800 ssh2 Aug 10 06:53:53 * sshd[25282]: Failed password for root from 218.92.0.212 port 3800 ssh2 |
2020-08-10 13:05:28 |
91.140.27.194 | attack | port scan and connect, tcp 80 (http) |
2020-08-10 13:13:04 |
182.160.125.93 | attackbotsspam | IP 182.160.125.93 attacked honeypot on port: 80 at 8/9/2020 8:55:04 PM |
2020-08-10 13:12:00 |
222.186.169.194 | attack | 2020-08-10T08:08:50.359604snf-827550 sshd[15277]: Failed password for root from 222.186.169.194 port 52312 ssh2 2020-08-10T08:08:53.439948snf-827550 sshd[15277]: Failed password for root from 222.186.169.194 port 52312 ssh2 2020-08-10T08:08:56.259969snf-827550 sshd[15277]: Failed password for root from 222.186.169.194 port 52312 ssh2 ... |
2020-08-10 13:13:22 |
112.85.42.172 | attackbotsspam | 2020-08-10T07:00:07.669250vps751288.ovh.net sshd\[17272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172 user=root 2020-08-10T07:00:10.134571vps751288.ovh.net sshd\[17272\]: Failed password for root from 112.85.42.172 port 42769 ssh2 2020-08-10T07:00:12.940000vps751288.ovh.net sshd\[17272\]: Failed password for root from 112.85.42.172 port 42769 ssh2 2020-08-10T07:00:16.760689vps751288.ovh.net sshd\[17272\]: Failed password for root from 112.85.42.172 port 42769 ssh2 2020-08-10T07:00:20.187378vps751288.ovh.net sshd\[17272\]: Failed password for root from 112.85.42.172 port 42769 ssh2 |
2020-08-10 13:03:44 |
195.110.35.213 | attack | HTTP DDOS |
2020-08-10 12:57:05 |
177.242.46.46 | attack | Aug 10 05:55:03 cp sshd[15173]: Failed password for root from 177.242.46.46 port 47132 ssh2 Aug 10 05:55:44 cp sshd[15560]: Failed password for root from 177.242.46.46 port 54448 ssh2 |
2020-08-10 12:57:40 |
221.207.8.251 | attackbots | Bruteforce detected by fail2ban |
2020-08-10 13:11:29 |
103.98.17.75 | attackspambots | Aug 10 05:56:35 h2646465 sshd[24632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.17.75 user=root Aug 10 05:56:37 h2646465 sshd[24632]: Failed password for root from 103.98.17.75 port 32940 ssh2 Aug 10 06:08:29 h2646465 sshd[26308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.17.75 user=root Aug 10 06:08:31 h2646465 sshd[26308]: Failed password for root from 103.98.17.75 port 41786 ssh2 Aug 10 06:15:18 h2646465 sshd[27490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.17.75 user=root Aug 10 06:15:20 h2646465 sshd[27490]: Failed password for root from 103.98.17.75 port 44824 ssh2 Aug 10 06:21:45 h2646465 sshd[28225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.98.17.75 user=root Aug 10 06:21:47 h2646465 sshd[28225]: Failed password for root from 103.98.17.75 port 47864 ssh2 Aug 10 06:28:09 h2646465 sshd[28880] |
2020-08-10 13:20:27 |
45.185.164.133 | attackbotsspam | Automatic report - Banned IP Access |
2020-08-10 13:14:29 |
159.203.219.38 | attackbotsspam | 2020-08-10T05:57:44.178454centos sshd[20161]: Failed password for root from 159.203.219.38 port 56657 ssh2 2020-08-10T05:59:16.065846centos sshd[20427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.219.38 user=root 2020-08-10T05:59:18.311257centos sshd[20427]: Failed password for root from 159.203.219.38 port 48381 ssh2 ... |
2020-08-10 13:22:26 |
112.49.38.4 | attackspam | Banned for a week because repeated abuses, for example SSH, but not only |
2020-08-10 13:22:50 |
61.177.124.118 | attackbotsspam | Banned for a week because repeated abuses, for example SSH, but not only |
2020-08-10 13:04:41 |