City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 75.53.89.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46323
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;75.53.89.66. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 03:22:28 CST 2025
;; MSG SIZE rcvd: 104
66.89.53.75.in-addr.arpa domain name pointer 75-53-89-66.lightspeed.rcklca.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
66.89.53.75.in-addr.arpa name = 75-53-89-66.lightspeed.rcklca.sbcglobal.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 94.158.23.66 | attack | B: Magento admin pass test (wrong country) |
2020-03-04 07:27:36 |
| 181.30.28.59 | attackspam | SASL PLAIN auth failed: ruser=... |
2020-03-04 07:13:08 |
| 164.132.46.14 | attack | Mar 3 23:38:17 vps691689 sshd[3840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.14 Mar 3 23:38:19 vps691689 sshd[3840]: Failed password for invalid user pi from 164.132.46.14 port 59136 ssh2 ... |
2020-03-04 06:57:38 |
| 146.185.147.174 | attackspam | 2020-03-03T22:49:44.780122shield sshd\[22481\]: Invalid user earl from 146.185.147.174 port 56424 2020-03-03T22:49:44.786077shield sshd\[22481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.147.174 2020-03-03T22:49:46.870378shield sshd\[22481\]: Failed password for invalid user earl from 146.185.147.174 port 56424 ssh2 2020-03-03T22:57:04.061195shield sshd\[23780\]: Invalid user arma from 146.185.147.174 port 37048 2020-03-03T22:57:04.066552shield sshd\[23780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.147.174 |
2020-03-04 07:13:33 |
| 218.92.0.207 | attackspam | Mar 3 22:36:09 game-panel sshd[851]: Failed password for root from 218.92.0.207 port 30210 ssh2 Mar 3 22:37:06 game-panel sshd[886]: Failed password for root from 218.92.0.207 port 49922 ssh2 |
2020-03-04 07:11:31 |
| 189.7.81.29 | attackspam | Mar 4 01:09:28 hosting sshd[17117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.81.29 user=admin Mar 4 01:09:30 hosting sshd[17117]: Failed password for admin from 189.7.81.29 port 45508 ssh2 ... |
2020-03-04 07:17:39 |
| 124.105.173.17 | attackbotsspam | 2020-03-03T23:03:09.084130vps751288.ovh.net sshd\[12000\]: Invalid user temp from 124.105.173.17 port 44829 2020-03-03T23:03:09.092390vps751288.ovh.net sshd\[12000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.105.173.17 2020-03-03T23:03:11.137062vps751288.ovh.net sshd\[12000\]: Failed password for invalid user temp from 124.105.173.17 port 44829 ssh2 2020-03-03T23:09:56.452331vps751288.ovh.net sshd\[12147\]: Invalid user proftpd from 124.105.173.17 port 40077 2020-03-03T23:09:56.459233vps751288.ovh.net sshd\[12147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.105.173.17 |
2020-03-04 06:59:20 |
| 222.186.175.202 | attack | Mar 4 02:31:37 server sshd\[19742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202 user=root Mar 4 02:31:39 server sshd\[19742\]: Failed password for root from 222.186.175.202 port 38574 ssh2 Mar 4 02:31:40 server sshd\[19746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202 user=root Mar 4 02:31:40 server sshd\[19748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202 user=root Mar 4 02:31:42 server sshd\[19746\]: Failed password for root from 222.186.175.202 port 23740 ssh2 ... |
2020-03-04 07:32:45 |
| 106.12.171.17 | attack | Mar 3 13:11:11 wbs sshd\[10213\]: Invalid user jomar from 106.12.171.17 Mar 3 13:11:11 wbs sshd\[10213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.171.17 Mar 3 13:11:13 wbs sshd\[10213\]: Failed password for invalid user jomar from 106.12.171.17 port 42482 ssh2 Mar 3 13:19:07 wbs sshd\[10924\]: Invalid user minecraft from 106.12.171.17 Mar 3 13:19:07 wbs sshd\[10924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.171.17 |
2020-03-04 07:25:02 |
| 128.199.106.169 | attackspambots | 2020-03-04T00:14:45.700011vps751288.ovh.net sshd\[13090\]: Invalid user http from 128.199.106.169 port 34768 2020-03-04T00:14:45.710678vps751288.ovh.net sshd\[13090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.106.169 2020-03-04T00:14:48.190950vps751288.ovh.net sshd\[13090\]: Failed password for invalid user http from 128.199.106.169 port 34768 ssh2 2020-03-04T00:20:56.618236vps751288.ovh.net sshd\[13210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.106.169 user=root 2020-03-04T00:20:58.361309vps751288.ovh.net sshd\[13210\]: Failed password for root from 128.199.106.169 port 51046 ssh2 |
2020-03-04 07:21:33 |
| 151.51.185.121 | attackspambots | Automatic report - Port Scan Attack |
2020-03-04 07:23:24 |
| 45.120.69.82 | attackbots | Mar 3 12:37:14 hpm sshd\[1669\]: Invalid user odoo from 45.120.69.82 Mar 3 12:37:14 hpm sshd\[1669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.120.69.82 Mar 3 12:37:17 hpm sshd\[1669\]: Failed password for invalid user odoo from 45.120.69.82 port 37682 ssh2 Mar 3 12:46:10 hpm sshd\[2959\]: Invalid user chenhaixin from 45.120.69.82 Mar 3 12:46:10 hpm sshd\[2959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.120.69.82 |
2020-03-04 07:09:07 |
| 52.82.2.150 | attack | Mar 3 13:15:07 web1 sshd\[31353\]: Invalid user system from 52.82.2.150 Mar 3 13:15:07 web1 sshd\[31353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.82.2.150 Mar 3 13:15:10 web1 sshd\[31353\]: Failed password for invalid user system from 52.82.2.150 port 58250 ssh2 Mar 3 13:21:59 web1 sshd\[32009\]: Invalid user postgres from 52.82.2.150 Mar 3 13:21:59 web1 sshd\[32009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.82.2.150 |
2020-03-04 07:31:07 |
| 138.197.148.135 | attackspam | Detected by Fail2Ban |
2020-03-04 07:28:27 |
| 112.85.42.178 | attack | Mar 3 23:54:32 server sshd[1868663]: Failed none for root from 112.85.42.178 port 50304 ssh2 Mar 3 23:54:35 server sshd[1868663]: Failed password for root from 112.85.42.178 port 50304 ssh2 Mar 3 23:54:40 server sshd[1868663]: Failed password for root from 112.85.42.178 port 50304 ssh2 |
2020-03-04 07:11:11 |