City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.52.55.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29215
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.52.55.137. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:49:37 CST 2025
;; MSG SIZE rcvd: 105
137.55.52.66.in-addr.arpa domain name pointer syn-066-052-055-137.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
137.55.52.66.in-addr.arpa name = syn-066-052-055-137.res.spectrum.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
200.94.199.138 | attackspam | Automatic report - Port Scan Attack |
2019-12-08 20:23:27 |
103.75.103.211 | attack | Dec 8 01:56:18 web9 sshd\[15601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.75.103.211 user=root Dec 8 01:56:21 web9 sshd\[15601\]: Failed password for root from 103.75.103.211 port 53726 ssh2 Dec 8 02:03:10 web9 sshd\[16806\]: Invalid user wemaster from 103.75.103.211 Dec 8 02:03:10 web9 sshd\[16806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.75.103.211 Dec 8 02:03:13 web9 sshd\[16806\]: Failed password for invalid user wemaster from 103.75.103.211 port 34786 ssh2 |
2019-12-08 20:16:35 |
173.212.203.205 | attackbotsspam | Dec 8 12:54:20 cp sshd[8197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.203.205 Dec 8 12:54:20 cp sshd[8197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.212.203.205 |
2019-12-08 20:27:13 |
202.107.238.14 | attackspambots | Dec 8 03:52:14 TORMINT sshd\[29514\]: Invalid user rockwell from 202.107.238.14 Dec 8 03:52:14 TORMINT sshd\[29514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.107.238.14 Dec 8 03:52:15 TORMINT sshd\[29514\]: Failed password for invalid user rockwell from 202.107.238.14 port 47507 ssh2 ... |
2019-12-08 20:33:55 |
54.37.67.144 | attackspambots | Dec 8 07:26:20 MK-Soft-VM3 sshd[4920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.67.144 Dec 8 07:26:21 MK-Soft-VM3 sshd[4920]: Failed password for invalid user fderk from 54.37.67.144 port 52998 ssh2 ... |
2019-12-08 20:14:30 |
37.148.211.251 | attackspambots | [Aegis] @ 2019-12-08 11:20:11 0000 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack |
2019-12-08 20:39:46 |
77.247.108.13 | attackspambots | 5160/udp 1234/udp 1235/udp... [2019-11-15/12-08]167pkt,63pt.(udp) |
2019-12-08 20:47:57 |
80.173.177.132 | attackbots | 2019-12-08T06:26:02.372523abusebot-8.cloudsearch.cf sshd\[554\]: Invalid user info from 80.173.177.132 port 37050 |
2019-12-08 20:43:59 |
89.185.228.118 | attackspambots | Dec 8 09:15:42 ncomp sshd[30332]: Invalid user info from 89.185.228.118 Dec 8 09:15:42 ncomp sshd[30332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.185.228.118 Dec 8 09:15:42 ncomp sshd[30332]: Invalid user info from 89.185.228.118 Dec 8 09:15:44 ncomp sshd[30332]: Failed password for invalid user info from 89.185.228.118 port 34062 ssh2 |
2019-12-08 20:37:21 |
218.92.0.184 | attack | 2019-12-08T13:24:17.765511vps751288.ovh.net sshd\[15069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184 user=root 2019-12-08T13:24:20.207887vps751288.ovh.net sshd\[15069\]: Failed password for root from 218.92.0.184 port 50245 ssh2 2019-12-08T13:24:23.157299vps751288.ovh.net sshd\[15069\]: Failed password for root from 218.92.0.184 port 50245 ssh2 2019-12-08T13:24:25.850076vps751288.ovh.net sshd\[15069\]: Failed password for root from 218.92.0.184 port 50245 ssh2 2019-12-08T13:24:29.621587vps751288.ovh.net sshd\[15069\]: Failed password for root from 218.92.0.184 port 50245 ssh2 |
2019-12-08 20:30:39 |
114.224.114.99 | attackspambots | $f2bV_matches |
2019-12-08 20:43:31 |
62.234.81.63 | attack | Dec 8 13:07:05 lnxweb62 sshd[8342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.81.63 |
2019-12-08 20:17:08 |
49.48.160.35 | attackbotsspam | UTC: 2019-12-07 port: 26/tcp |
2019-12-08 20:48:24 |
183.82.121.34 | attack | Dec 8 13:31:15 microserver sshd[10600]: Invalid user mailman from 183.82.121.34 port 57857 Dec 8 13:31:15 microserver sshd[10600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34 Dec 8 13:31:18 microserver sshd[10600]: Failed password for invalid user mailman from 183.82.121.34 port 57857 ssh2 Dec 8 13:37:21 microserver sshd[11395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34 user=root Dec 8 13:37:23 microserver sshd[11395]: Failed password for root from 183.82.121.34 port 34240 ssh2 Dec 8 13:49:16 microserver sshd[13051]: Invalid user messick from 183.82.121.34 port 43448 Dec 8 13:49:16 microserver sshd[13051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34 Dec 8 13:49:19 microserver sshd[13051]: Failed password for invalid user messick from 183.82.121.34 port 43448 ssh2 Dec 8 13:55:20 microserver sshd[14246]: pam_unix(sshd:auth): aut |
2019-12-08 20:38:11 |
192.64.86.92 | attack | 192.64.86.92 was recorded 6 times by 1 hosts attempting to connect to the following ports: 5090,5080,5070,5010,5020,2060. Incident counter (4h, 24h, all-time): 6, 6, 317 |
2019-12-08 20:43:06 |