City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.29.80.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;74.29.80.48. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 20:21:53 CST 2025
;; MSG SIZE rcvd: 104
Host 48.80.29.74.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 48.80.29.74.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.196.67.41 | attack | Jan 2 00:03:37 server sshd[41634]: Failed password for invalid user eckers from 5.196.67.41 port 36330 ssh2 Jan 2 00:16:51 server sshd[43224]: Failed password for root from 5.196.67.41 port 60496 ssh2 Jan 2 00:19:54 server sshd[43322]: Failed password for invalid user autodoor from 5.196.67.41 port 58152 ssh2 |
2020-01-02 08:41:36 |
| 207.35.224.251 | attackbots | Unauthorized connection attempt detected from IP address 207.35.224.251 to port 445 |
2020-01-02 08:16:10 |
| 190.191.194.9 | attackbotsspam | Jan 2 00:54:28 vpn01 sshd[2056]: Failed password for root from 190.191.194.9 port 58361 ssh2 Jan 2 00:56:42 vpn01 sshd[2064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.194.9 ... |
2020-01-02 08:19:38 |
| 93.39.182.4 | attackspambots | Jan 2 01:25:39 MK-Soft-Root2 sshd[2822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.39.182.4 Jan 2 01:25:41 MK-Soft-Root2 sshd[2822]: Failed password for invalid user kasmedo from 93.39.182.4 port 59812 ssh2 ... |
2020-01-02 08:33:46 |
| 92.190.153.246 | attackspambots | 2020-01-01T23:53:59.711843shield sshd\[32341\]: Invalid user corp from 92.190.153.246 port 58570 2020-01-01T23:53:59.717088shield sshd\[32341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.190.153.246 2020-01-01T23:54:01.348517shield sshd\[32341\]: Failed password for invalid user corp from 92.190.153.246 port 58570 ssh2 2020-01-01T23:57:16.701673shield sshd\[1328\]: Invalid user guest from 92.190.153.246 port 60636 2020-01-01T23:57:16.706100shield sshd\[1328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.190.153.246 |
2020-01-02 08:07:35 |
| 218.92.0.205 | attack | Jan 2 00:25:19 zeus sshd[11201]: Failed password for root from 218.92.0.205 port 63207 ssh2 Jan 2 00:25:22 zeus sshd[11201]: Failed password for root from 218.92.0.205 port 63207 ssh2 Jan 2 00:25:25 zeus sshd[11201]: Failed password for root from 218.92.0.205 port 63207 ssh2 Jan 2 00:26:48 zeus sshd[11288]: Failed password for root from 218.92.0.205 port 44454 ssh2 |
2020-01-02 08:37:15 |
| 111.67.202.39 | attackbotsspam | Jan 2 00:09:11 haigwepa sshd[32144]: Failed password for root from 111.67.202.39 port 45061 ssh2 ... |
2020-01-02 08:22:42 |
| 164.132.57.16 | attack | Jan 2 01:27:18 mout sshd[13631]: Failed password for invalid user degrande from 164.132.57.16 port 47674 ssh2 Jan 2 01:42:45 mout sshd[15215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16 user=root Jan 2 01:42:47 mout sshd[15215]: Failed password for root from 164.132.57.16 port 38759 ssh2 |
2020-01-02 08:44:27 |
| 222.186.175.23 | attack | Jan 1 19:10:54 plusreed sshd[18413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23 user=root Jan 1 19:10:56 plusreed sshd[18413]: Failed password for root from 222.186.175.23 port 33333 ssh2 ... |
2020-01-02 08:11:17 |
| 178.128.218.56 | attackspambots | Invalid user puccinelli from 178.128.218.56 port 57522 |
2020-01-02 08:27:07 |
| 171.244.18.195 | attack | Unauthorized connection attempt detected from IP address 171.244.18.195 to port 445 |
2020-01-02 08:23:10 |
| 58.215.13.154 | attack | B: Magento admin pass test (wrong country) |
2020-01-02 08:34:07 |
| 180.100.214.87 | attackbotsspam | Jan 1 23:51:58 MK-Soft-Root1 sshd[24572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.100.214.87 Jan 1 23:52:00 MK-Soft-Root1 sshd[24572]: Failed password for invalid user marjon from 180.100.214.87 port 49402 ssh2 ... |
2020-01-02 08:43:33 |
| 218.92.0.158 | attack | 2020-01-02T00:16:53.290987abusebot-4.cloudsearch.cf sshd[1014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158 user=root 2020-01-02T00:16:55.549579abusebot-4.cloudsearch.cf sshd[1014]: Failed password for root from 218.92.0.158 port 41432 ssh2 2020-01-02T00:16:59.477886abusebot-4.cloudsearch.cf sshd[1014]: Failed password for root from 218.92.0.158 port 41432 ssh2 2020-01-02T00:16:53.290987abusebot-4.cloudsearch.cf sshd[1014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158 user=root 2020-01-02T00:16:55.549579abusebot-4.cloudsearch.cf sshd[1014]: Failed password for root from 218.92.0.158 port 41432 ssh2 2020-01-02T00:16:59.477886abusebot-4.cloudsearch.cf sshd[1014]: Failed password for root from 218.92.0.158 port 41432 ssh2 2020-01-02T00:16:53.290987abusebot-4.cloudsearch.cf sshd[1014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218. ... |
2020-01-02 08:17:50 |
| 129.211.63.79 | attackspambots | Invalid user suppa from 129.211.63.79 port 55604 |
2020-01-02 08:09:35 |