City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.119.60.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64875
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;72.119.60.0. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 11:27:18 CST 2025
;; MSG SIZE rcvd: 104
0.60.119.72.in-addr.arpa domain name pointer 0.sub-72-119-60.myvzw.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
0.60.119.72.in-addr.arpa name = 0.sub-72-119-60.myvzw.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.243.25.75 | attack | Aug 3 09:42:03 ns sshd[17065]: Connection from 104.243.25.75 port 33118 on 134.119.36.27 port 22 Aug 3 09:42:05 ns sshd[17065]: User r.r from 104.243.25.75 not allowed because not listed in AllowUsers Aug 3 09:42:05 ns sshd[17065]: Failed password for invalid user r.r from 104.243.25.75 port 33118 ssh2 Aug 3 09:42:05 ns sshd[17065]: Received disconnect from 104.243.25.75 port 33118:11: Bye Bye [preauth] Aug 3 09:42:05 ns sshd[17065]: Disconnected from 104.243.25.75 port 33118 [preauth] Aug 3 10:08:02 ns sshd[1110]: Connection from 104.243.25.75 port 58222 on 134.119.36.27 port 22 Aug 3 10:08:28 ns sshd[1110]: Connection closed by 104.243.25.75 port 58222 [preauth] Aug 3 10:20:46 ns sshd[24354]: Connection from 104.243.25.75 port 50234 on 134.119.36.27 port 22 Aug 3 10:20:50 ns sshd[24354]: User r.r from 104.243.25.75 not allowed because not listed in AllowUsers Aug 3 10:20:50 ns sshd[24354]: Failed password for invalid user r.r from 104.243.25.75 port 50234 ss........ ------------------------------- |
2020-08-04 19:23:46 |
| 49.235.98.68 | attackbots | Aug 4 00:16:49 web1 sshd\[26194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.98.68 user=root Aug 4 00:16:52 web1 sshd\[26194\]: Failed password for root from 49.235.98.68 port 34076 ssh2 Aug 4 00:20:34 web1 sshd\[26514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.98.68 user=root Aug 4 00:20:36 web1 sshd\[26514\]: Failed password for root from 49.235.98.68 port 46232 ssh2 Aug 4 00:24:26 web1 sshd\[26837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.98.68 user=root |
2020-08-04 19:08:43 |
| 222.186.42.137 | attackspam | Aug 4 13:01:54 abendstille sshd\[11254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137 user=root Aug 4 13:01:56 abendstille sshd\[11254\]: Failed password for root from 222.186.42.137 port 59212 ssh2 Aug 4 13:01:59 abendstille sshd\[11254\]: Failed password for root from 222.186.42.137 port 59212 ssh2 Aug 4 13:02:17 abendstille sshd\[11619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137 user=root Aug 4 13:02:19 abendstille sshd\[11619\]: Failed password for root from 222.186.42.137 port 43849 ssh2 ... |
2020-08-04 19:04:30 |
| 54.37.156.188 | attack | Aug 4 12:30:24 ip40 sshd[30985]: Failed password for root from 54.37.156.188 port 48642 ssh2 ... |
2020-08-04 19:24:14 |
| 51.75.249.224 | attackbots | Aug 4 13:03:21 * sshd[16382]: Failed password for root from 51.75.249.224 port 50456 ssh2 |
2020-08-04 19:27:36 |
| 51.104.242.17 | attack | Aug 4 11:42:33 vmd17057 sshd[29176]: Failed password for root from 51.104.242.17 port 59748 ssh2 ... |
2020-08-04 19:07:00 |
| 218.92.0.249 | attackbots | Aug 4 21:31:24 localhost sshd[1844941]: Unable to negotiate with 218.92.0.249 port 25276: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... |
2020-08-04 19:35:00 |
| 85.209.0.252 | attackspambots | (sshd) Failed SSH login from 85.209.0.252 (RU/Russia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 4 13:24:42 amsweb01 sshd[17220]: Did not receive identification string from 85.209.0.252 port 21852 Aug 4 13:24:43 amsweb01 sshd[17225]: Did not receive identification string from 85.209.0.252 port 48466 Aug 4 13:24:43 amsweb01 sshd[17221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.252 user=root Aug 4 13:24:44 amsweb01 sshd[17223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.252 user=root Aug 4 13:24:46 amsweb01 sshd[17221]: Failed password for root from 85.209.0.252 port 4558 ssh2 |
2020-08-04 19:39:12 |
| 218.92.0.148 | attackbotsspam | Unauthorized connection attempt detected from IP address 218.92.0.148 to port 22 |
2020-08-04 19:01:31 |
| 220.250.25.36 | attack | Aug 4 12:01:58 buvik sshd[17552]: Failed password for root from 220.250.25.36 port 25303 ssh2 Aug 4 12:05:01 buvik sshd[17908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.250.25.36 user=root Aug 4 12:05:03 buvik sshd[17908]: Failed password for root from 220.250.25.36 port 64997 ssh2 ... |
2020-08-04 19:29:11 |
| 45.129.33.26 | attackspambots |
|
2020-08-04 19:28:22 |
| 64.235.34.17 | attackbotsspam | Aug 2 09:07:12 xxxxxxx8 sshd[25212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.235.34.17 user=r.r Aug 2 09:07:14 xxxxxxx8 sshd[25212]: Failed password for r.r from 64.235.34.17 port 49934 ssh2 Aug 2 09:11:53 xxxxxxx8 sshd[25708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.235.34.17 user=r.r Aug 2 09:11:54 xxxxxxx8 sshd[25708]: Failed password for r.r from 64.235.34.17 port 51068 ssh2 Aug 2 09:14:03 xxxxxxx8 sshd[25758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.235.34.17 user=r.r Aug 2 09:14:05 xxxxxxx8 sshd[25758]: Failed password for r.r from 64.235.34.17 port 33569 ssh2 Aug 2 09:16:10 xxxxxxx8 sshd[26007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.235.34.17 user=r.r Aug 2 09:16:12 xxxxxxx8 sshd[26007]: Failed password for r.r from 64.235.34.17 port 44250 ssh2 Aug ........ ------------------------------ |
2020-08-04 19:33:23 |
| 222.186.42.7 | attackbotsspam | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-08-04 19:30:13 |
| 149.56.13.111 | attackbots | Aug 4 11:16:41 ns382633 sshd\[30595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.13.111 user=root Aug 4 11:16:44 ns382633 sshd\[30595\]: Failed password for root from 149.56.13.111 port 51963 ssh2 Aug 4 11:23:28 ns382633 sshd\[31662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.13.111 user=root Aug 4 11:23:31 ns382633 sshd\[31662\]: Failed password for root from 149.56.13.111 port 38266 ssh2 Aug 4 11:26:33 ns382633 sshd\[32413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.13.111 user=root |
2020-08-04 19:22:36 |
| 213.194.99.235 | attackbotsspam | Lines containing failures of 213.194.99.235 Aug 3 01:00:42 nemesis sshd[12103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.194.99.235 user=r.r Aug 3 01:00:44 nemesis sshd[12103]: Failed password for r.r from 213.194.99.235 port 36373 ssh2 Aug 3 01:00:45 nemesis sshd[12103]: Received disconnect from 213.194.99.235 port 36373:11: Bye Bye [preauth] Aug 3 01:00:45 nemesis sshd[12103]: Disconnected from authenticating user r.r 213.194.99.235 port 36373 [preauth] Aug 3 01:05:55 nemesis sshd[13920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.194.99.235 user=r.r ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=213.194.99.235 |
2020-08-04 19:09:05 |