City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 75.98.68.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4650
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;75.98.68.64. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:07:26 CST 2025
;; MSG SIZE rcvd: 104
Host 64.68.98.75.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 64.68.98.75.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 37.192.205.4 | attackspam | Netgear DGN Device Remote Command Execution Vulnerability, PTR: l37-192-205-4.novotelecom.ru. |
2019-08-13 07:17:46 |
| 71.202.216.185 | attackbotsspam | Aug 13 02:13:43 srv-4 sshd\[13387\]: Invalid user mobile from 71.202.216.185 Aug 13 02:13:43 srv-4 sshd\[13387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.202.216.185 Aug 13 02:13:45 srv-4 sshd\[13387\]: Failed password for invalid user mobile from 71.202.216.185 port 49900 ssh2 ... |
2019-08-13 07:38:34 |
| 61.222.119.235 | attackbots | 445/tcp 445/tcp [2019-07-09/08-12]2pkt |
2019-08-13 07:22:16 |
| 118.71.224.220 | attack | 445/tcp 445/tcp [2019-08-01/12]2pkt |
2019-08-13 07:15:29 |
| 139.199.221.240 | attackbotsspam | Aug 13 00:17:13 microserver sshd[20544]: Invalid user bot1 from 139.199.221.240 port 46570 Aug 13 00:17:13 microserver sshd[20544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.221.240 Aug 13 00:17:15 microserver sshd[20544]: Failed password for invalid user bot1 from 139.199.221.240 port 46570 ssh2 Aug 13 00:22:23 microserver sshd[21266]: Invalid user bi from 139.199.221.240 port 36272 Aug 13 00:22:23 microserver sshd[21266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.221.240 Aug 13 00:32:38 microserver sshd[22737]: Invalid user ts from 139.199.221.240 port 43890 Aug 13 00:32:38 microserver sshd[22737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.221.240 Aug 13 00:32:40 microserver sshd[22737]: Failed password for invalid user ts from 139.199.221.240 port 43890 ssh2 Aug 13 00:37:49 microserver sshd[23431]: Invalid user sun from 139.199.221.240 port 33596 |
2019-08-13 06:58:50 |
| 106.13.60.58 | attack | Aug 12 17:47:12 aat-srv002 sshd[21812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.60.58 Aug 12 17:47:14 aat-srv002 sshd[21812]: Failed password for invalid user tena from 106.13.60.58 port 35512 ssh2 Aug 12 17:50:30 aat-srv002 sshd[21940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.60.58 Aug 12 17:50:32 aat-srv002 sshd[21940]: Failed password for invalid user jpg from 106.13.60.58 port 58984 ssh2 ... |
2019-08-13 07:02:35 |
| 117.50.46.200 | attack | Aug 13 01:12:43 eventyay sshd[6898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.46.200 Aug 13 01:12:45 eventyay sshd[6898]: Failed password for invalid user ec2-user from 117.50.46.200 port 46730 ssh2 Aug 13 01:16:57 eventyay sshd[7907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.46.200 ... |
2019-08-13 07:21:23 |
| 60.251.196.251 | attack | Aug 13 02:04:36 yabzik sshd[8059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.251.196.251 Aug 13 02:04:38 yabzik sshd[8059]: Failed password for invalid user guest1 from 60.251.196.251 port 51862 ssh2 Aug 13 02:11:30 yabzik sshd[10516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.251.196.251 |
2019-08-13 07:13:18 |
| 94.177.214.200 | attack | Splunk® : Brute-Force login attempt on SSH: Aug 12 19:36:35 testbed sshd[3535]: Disconnected from 94.177.214.200 port 58552 [preauth] |
2019-08-13 07:39:17 |
| 117.95.213.130 | attack | Aug 12 17:46:45 eola postfix/smtpd[16494]: warning: hostname 130.213.95.117.broad.sq.js.dynamic.163data.com.cn does not resolve to address 117.95.213.130: Name or service not known Aug 12 17:46:45 eola postfix/smtpd[16494]: connect from unknown[117.95.213.130] Aug 12 17:46:46 eola postfix/smtpd[16494]: lost connection after AUTH from unknown[117.95.213.130] Aug 12 17:46:46 eola postfix/smtpd[16494]: disconnect from unknown[117.95.213.130] ehlo=1 auth=0/1 commands=1/2 Aug 12 17:46:46 eola postfix/smtpd[16494]: warning: hostname 130.213.95.117.broad.sq.js.dynamic.163data.com.cn does not resolve to address 117.95.213.130: Name or service not known Aug 12 17:46:46 eola postfix/smtpd[16494]: connect from unknown[117.95.213.130] Aug 12 17:46:47 eola postfix/smtpd[16494]: lost connection after AUTH from unknown[117.95.213.130] Aug 12 17:46:47 eola postfix/smtpd[16494]: disconnect from unknown[117.95.213.130] ehlo=1 auth=0/1 commands=1/2 Aug 12 17:46:47 eola postfix/smtpd[16494........ ------------------------------- |
2019-08-13 07:02:14 |
| 92.118.37.97 | attackspambots | 08/12/2019-18:54:33.390683 92.118.37.97 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-08-13 07:39:36 |
| 134.209.155.248 | attack | Aug 13 01:35:53 server2 sshd\[17743\]: Invalid user fake from 134.209.155.248 Aug 13 01:35:54 server2 sshd\[17745\]: Invalid user support from 134.209.155.248 Aug 13 01:35:55 server2 sshd\[17747\]: Invalid user ubnt from 134.209.155.248 Aug 13 01:35:56 server2 sshd\[17749\]: Invalid user admin from 134.209.155.248 Aug 13 01:35:58 server2 sshd\[17751\]: User root from 134.209.155.248 not allowed because not listed in AllowUsers Aug 13 01:35:59 server2 sshd\[17753\]: Invalid user admin from 134.209.155.248 |
2019-08-13 07:19:59 |
| 154.126.38.208 | attackspam | Attempted WordPress login: "GET /wp-login.php" |
2019-08-13 07:35:20 |
| 85.40.208.178 | attack | Aug 13 01:56:07 pkdns2 sshd\[34466\]: Invalid user sybase from 85.40.208.178Aug 13 01:56:09 pkdns2 sshd\[34466\]: Failed password for invalid user sybase from 85.40.208.178 port 2461 ssh2Aug 13 02:00:31 pkdns2 sshd\[34633\]: Invalid user shop from 85.40.208.178Aug 13 02:00:33 pkdns2 sshd\[34633\]: Failed password for invalid user shop from 85.40.208.178 port 2462 ssh2Aug 13 02:04:57 pkdns2 sshd\[34763\]: Invalid user team from 85.40.208.178Aug 13 02:04:58 pkdns2 sshd\[34763\]: Failed password for invalid user team from 85.40.208.178 port 2463 ssh2 ... |
2019-08-13 07:15:58 |
| 103.114.107.209 | attack | Aug 13 05:11:33 webhost01 sshd[31693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.114.107.209 Aug 13 05:11:35 webhost01 sshd[31693]: Failed password for invalid user support from 103.114.107.209 port 49255 ssh2 ... |
2019-08-13 07:01:20 |