City: unknown
Region: unknown
Country: United States
Internet Service Provider: Verizon
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.89.99.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46003
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.89.99.45. IN A
;; AUTHORITY SECTION:
. 480 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023032900 1800 900 604800 86400
;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 29 15:35:59 CST 2023
;; MSG SIZE rcvd: 104
45.99.89.66.in-addr.arpa domain name pointer 66.89.99.45.ptr.us.xo.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
45.99.89.66.in-addr.arpa name = 66.89.99.45.ptr.us.xo.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
178.128.103.151 | attack | 178.128.103.151 - - \[16/Nov/2019:06:17:21 +0000\] "POST /wp/wp-login.php HTTP/1.1" 200 4205 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 178.128.103.151 - - \[16/Nov/2019:06:17:28 +0000\] "POST /wp/xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" ... |
2019-11-16 21:58:19 |
180.183.173.195 | attackbots | Unauthorized connection attempt from IP address 180.183.173.195 on Port 445(SMB) |
2019-11-16 22:17:22 |
139.59.94.225 | attackspam | (sshd) Failed SSH login from 139.59.94.225 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 16 13:35:09 elude sshd[18997]: Invalid user benjami from 139.59.94.225 port 49240 Nov 16 13:35:11 elude sshd[18997]: Failed password for invalid user benjami from 139.59.94.225 port 49240 ssh2 Nov 16 13:47:50 elude sshd[20935]: Invalid user named from 139.59.94.225 port 47998 Nov 16 13:47:52 elude sshd[20935]: Failed password for invalid user named from 139.59.94.225 port 47998 ssh2 Nov 16 13:51:56 elude sshd[21526]: Invalid user marita from 139.59.94.225 port 56550 |
2019-11-16 22:11:56 |
45.80.65.82 | attackspam | Invalid user guest from 45.80.65.82 port 51088 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82 Failed password for invalid user guest from 45.80.65.82 port 51088 ssh2 Invalid user mysql from 45.80.65.82 port 57988 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82 |
2019-11-16 21:40:20 |
103.21.125.17 | attackbots | 2019-11-16T04:25:29.6200931495-001 sshd\[50434\]: Invalid user test from 103.21.125.17 port 56194 2019-11-16T04:25:29.6288421495-001 sshd\[50434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.125.17 2019-11-16T04:25:31.5674201495-001 sshd\[50434\]: Failed password for invalid user test from 103.21.125.17 port 56194 ssh2 2019-11-16T04:29:37.0157651495-001 sshd\[50576\]: Invalid user cadat from 103.21.125.17 port 36110 2019-11-16T04:29:37.0223111495-001 sshd\[50576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.125.17 2019-11-16T04:29:39.3383161495-001 sshd\[50576\]: Failed password for invalid user cadat from 103.21.125.17 port 36110 ssh2 ... |
2019-11-16 21:41:30 |
128.199.100.225 | attackspam | Nov 16 10:20:33 andromeda sshd\[40982\]: Invalid user loyola from 128.199.100.225 port 39606 Nov 16 10:20:33 andromeda sshd\[40982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.100.225 Nov 16 10:20:34 andromeda sshd\[40982\]: Failed password for invalid user loyola from 128.199.100.225 port 39606 ssh2 |
2019-11-16 21:41:46 |
121.207.206.61 | attackspambots | Unauthorised access (Nov 16) SRC=121.207.206.61 LEN=40 TTL=51 ID=8966 TCP DPT=8080 WINDOW=5026 SYN Unauthorised access (Nov 15) SRC=121.207.206.61 LEN=40 TTL=51 ID=30418 TCP DPT=8080 WINDOW=5026 SYN Unauthorised access (Nov 13) SRC=121.207.206.61 LEN=40 TTL=51 ID=56171 TCP DPT=8080 WINDOW=5026 SYN Unauthorised access (Nov 12) SRC=121.207.206.61 LEN=40 TTL=51 ID=47811 TCP DPT=8080 WINDOW=5026 SYN |
2019-11-16 21:46:11 |
185.176.27.178 | attackbots | Nov 16 14:48:28 mc1 kernel: \[5198373.887397\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.178 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=54492 PROTO=TCP SPT=45871 DPT=30354 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 16 14:53:10 mc1 kernel: \[5198655.602329\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.178 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=61459 PROTO=TCP SPT=45871 DPT=15768 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 16 14:56:14 mc1 kernel: \[5198839.567730\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.178 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=31784 PROTO=TCP SPT=45871 DPT=26553 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-11-16 22:08:42 |
187.76.240.186 | attackspam | Nov 16 01:58:18 sachi sshd\[28798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.76.240.186 user=root Nov 16 01:58:21 sachi sshd\[28798\]: Failed password for root from 187.76.240.186 port 41496 ssh2 Nov 16 02:02:35 sachi sshd\[29124\]: Invalid user ailis from 187.76.240.186 Nov 16 02:02:35 sachi sshd\[29124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.76.240.186 Nov 16 02:02:37 sachi sshd\[29124\]: Failed password for invalid user ailis from 187.76.240.186 port 59899 ssh2 |
2019-11-16 21:47:55 |
200.164.217.210 | attackbots | (sshd) Failed SSH login from 200.164.217.210 (-): 5 in the last 3600 secs |
2019-11-16 22:17:38 |
185.86.4.212 | attackbotsspam | Unauthorized connection attempt from IP address 185.86.4.212 on Port 445(SMB) |
2019-11-16 22:10:11 |
103.214.137.220 | attackbotsspam | Unauthorized connection attempt from IP address 103.214.137.220 on Port 445(SMB) |
2019-11-16 22:19:06 |
138.36.96.46 | attackbotsspam | Nov 16 14:35:37 minden010 sshd[7081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.36.96.46 Nov 16 14:35:39 minden010 sshd[7081]: Failed password for invalid user erdem from 138.36.96.46 port 49536 ssh2 Nov 16 14:40:45 minden010 sshd[8904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.36.96.46 ... |
2019-11-16 21:44:25 |
222.186.15.18 | attackbots | Nov 16 14:47:40 vps691689 sshd[11679]: Failed password for root from 222.186.15.18 port 52652 ssh2 Nov 16 14:48:31 vps691689 sshd[11688]: Failed password for root from 222.186.15.18 port 48717 ssh2 ... |
2019-11-16 22:01:08 |
14.141.64.104 | attackbotsspam | Unauthorised access (Nov 16) SRC=14.141.64.104 LEN=40 PREC=0x20 TTL=242 ID=11017 TCP DPT=445 WINDOW=1024 SYN |
2019-11-16 22:07:39 |