City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.44.5.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43978
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;72.44.5.245. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031302 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 14 02:28:42 CST 2025
;; MSG SIZE rcvd: 104
245.5.44.72.in-addr.arpa domain name pointer h245.5.44.72.static.ip.windstream.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
245.5.44.72.in-addr.arpa name = h245.5.44.72.static.ip.windstream.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
123.6.51.133 | attackbotsspam | Aug 11 14:06:39 vserver sshd\[4964\]: Failed password for root from 123.6.51.133 port 52376 ssh2Aug 11 14:09:26 vserver sshd\[5041\]: Failed password for root from 123.6.51.133 port 52850 ssh2Aug 11 14:11:04 vserver sshd\[5059\]: Failed password for root from 123.6.51.133 port 42476 ssh2Aug 11 14:12:44 vserver sshd\[5082\]: Failed password for root from 123.6.51.133 port 60328 ssh2 ... |
2020-08-11 21:57:57 |
139.59.83.203 | attack | Automatic report - Banned IP Access |
2020-08-11 22:11:11 |
193.112.126.64 | attackspam | Aug 11 15:13:43 ip40 sshd[26038]: Failed password for root from 193.112.126.64 port 52592 ssh2 ... |
2020-08-11 22:23:00 |
79.137.34.248 | attackspambots | Aug 11 14:08:28 vpn01 sshd[2181]: Failed password for root from 79.137.34.248 port 42847 ssh2 ... |
2020-08-11 21:45:35 |
185.143.223.244 | attackspambots | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-08-11 22:25:32 |
218.92.0.185 | attackbots | Failed password for root from 218.92.0.185 port 38279 ssh2 Failed password for root from 218.92.0.185 port 38279 ssh2 Failed password for root from 218.92.0.185 port 38279 ssh2 Failed password for root from 218.92.0.185 port 38279 ssh2 |
2020-08-11 22:01:48 |
179.131.11.234 | attack | 2020-08-11T13:43:53.764947shield sshd\[12671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.131.11.234 user=root 2020-08-11T13:43:56.024317shield sshd\[12671\]: Failed password for root from 179.131.11.234 port 55590 ssh2 2020-08-11T13:48:44.745375shield sshd\[13180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.131.11.234 user=root 2020-08-11T13:48:46.283451shield sshd\[13180\]: Failed password for root from 179.131.11.234 port 35992 ssh2 2020-08-11T13:53:34.646208shield sshd\[13653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.131.11.234 user=root |
2020-08-11 22:09:27 |
187.178.24.195 | attackspam | 20/8/11@08:12:47: FAIL: Alarm-Telnet address from=187.178.24.195 ... |
2020-08-11 21:54:24 |
61.177.172.102 | attack | Aug 11 15:03:04 rocket sshd[30194]: Failed password for root from 61.177.172.102 port 34241 ssh2 Aug 11 15:03:16 rocket sshd[30209]: Failed password for root from 61.177.172.102 port 43836 ssh2 ... |
2020-08-11 22:10:06 |
106.54.123.84 | attackspambots | Aug 11 14:48:22 vps639187 sshd\[7744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.123.84 user=root Aug 11 14:48:23 vps639187 sshd\[7744\]: Failed password for root from 106.54.123.84 port 48796 ssh2 Aug 11 14:54:15 vps639187 sshd\[7847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.123.84 user=root ... |
2020-08-11 22:05:23 |
78.46.85.236 | attackbotsspam | 20 attempts against mh-misbehave-ban on leaf |
2020-08-11 21:50:30 |
128.199.81.160 | attackspam | k+ssh-bruteforce |
2020-08-11 21:48:57 |
45.4.168.97 | attack | failed_logins |
2020-08-11 22:06:37 |
85.99.247.196 | attack | 1597147930 - 08/11/2020 14:12:10 Host: 85.99.247.196/85.99.247.196 Port: 445 TCP Blocked |
2020-08-11 22:27:34 |
119.45.10.5 | attack | Aug 11 14:43:56 ip106 sshd[13581]: Failed password for root from 119.45.10.5 port 58558 ssh2 ... |
2020-08-11 21:52:55 |