City: Dumas
Region: Texas
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.172.47.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28069
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;72.172.47.212. IN A
;; AUTHORITY SECTION:
. 509 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020033102 1800 900 604800 86400
;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 18:06:22 CST 2020
;; MSG SIZE rcvd: 117
212.47.172.72.in-addr.arpa domain name pointer h212.47.172.72.dynamic.ip.windstream.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
212.47.172.72.in-addr.arpa name = h212.47.172.72.dynamic.ip.windstream.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 186.233.94.46 | attackbots | Port probing on unauthorized port 1433 |
2020-08-13 07:01:43 |
| 67.54.159.145 | attackspam | Aug 13 00:02:15 takio sshd[23089]: Invalid user pi from 67.54.159.145 port 56164 Aug 13 00:02:22 takio sshd[23092]: Invalid user pi from 67.54.159.145 port 59536 Aug 13 00:02:29 takio sshd[23094]: Invalid user pi from 67.54.159.145 port 34606 |
2020-08-13 06:37:00 |
| 62.212.169.193 | attackspam | 2020-08-13 06:45:58 | |
| 175.6.137.38 | attackbots | bruteforce detected |
2020-08-13 07:06:30 |
| 168.121.51.85 | attackspambots | Unauthorized connection attempt from IP address 168.121.51.85 on Port 445(SMB) |
2020-08-13 06:47:13 |
| 142.93.235.47 | attackbots | bruteforce detected |
2020-08-13 06:59:34 |
| 118.24.241.97 | attack | Aug 13 00:04:18 nextcloud sshd\[13293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.241.97 user=root Aug 13 00:04:20 nextcloud sshd\[13293\]: Failed password for root from 118.24.241.97 port 47154 ssh2 Aug 13 00:09:31 nextcloud sshd\[17707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.241.97 user=root |
2020-08-13 07:07:05 |
| 143.92.32.108 | attackspambots |
|
2020-08-13 07:06:45 |
| 111.229.148.198 | attackbotsspam | Aug 13 00:15:32 ns382633 sshd\[31538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.148.198 user=root Aug 13 00:15:34 ns382633 sshd\[31538\]: Failed password for root from 111.229.148.198 port 55132 ssh2 Aug 13 00:23:29 ns382633 sshd\[32725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.148.198 user=root Aug 13 00:23:31 ns382633 sshd\[32725\]: Failed password for root from 111.229.148.198 port 48310 ssh2 Aug 13 00:30:20 ns382633 sshd\[2057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.148.198 user=root |
2020-08-13 06:37:46 |
| 103.125.190.127 | attackspam | Aug 12 17:44:05 HPCompaq6200-Xubuntu sshd[553729]: Unable to negotiate with 103.125.190.127 port 47914: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1 [preauth] Aug 12 17:44:11 HPCompaq6200-Xubuntu sshd[553756]: Unable to negotiate with 103.125.190.127 port 49931: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1 [preauth] Aug 12 17:44:13 HPCompaq6200-Xubuntu sshd[553774]: Unable to negotiate with 103.125.190.127 port 50933: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1 [preauth] ... |
2020-08-13 06:45:28 |
| 45.167.10.87 | attack | 2020-08-13 07:00:27 | |
| 59.124.205.214 | attackspam | Aug 13 00:03:50 server sshd[10400]: Failed password for root from 59.124.205.214 port 33554 ssh2 Aug 13 00:06:45 server sshd[11845]: Failed password for root from 59.124.205.214 port 53120 ssh2 Aug 13 00:09:39 server sshd[13021]: Failed password for root from 59.124.205.214 port 44460 ssh2 |
2020-08-13 06:50:45 |
| 195.206.105.217 | attackbotsspam | Aug 12 18:02:25 firewall sshd[1179]: Invalid user admin from 195.206.105.217 Aug 12 18:02:28 firewall sshd[1179]: Failed password for invalid user admin from 195.206.105.217 port 40832 ssh2 Aug 12 18:02:30 firewall sshd[1193]: Invalid user admin from 195.206.105.217 ... |
2020-08-13 06:35:22 |
| 84.255.249.179 | attackspambots | bruteforce detected |
2020-08-13 06:55:26 |
| 86.61.66.59 | attackbotsspam | Aug 13 00:57:53 OPSO sshd\[922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.61.66.59 user=root Aug 13 00:57:55 OPSO sshd\[922\]: Failed password for root from 86.61.66.59 port 53516 ssh2 Aug 13 01:01:39 OPSO sshd\[1898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.61.66.59 user=root Aug 13 01:01:41 OPSO sshd\[1898\]: Failed password for root from 86.61.66.59 port 58787 ssh2 Aug 13 01:05:31 OPSO sshd\[2848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.61.66.59 user=root |
2020-08-13 07:10:35 |