City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 9.158.93.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49586
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;9.158.93.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 23:03:47 CST 2025
;; MSG SIZE rcvd: 105
Host 104.93.158.9.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 104.93.158.9.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 118.69.76.169 | attackspambots | Unauthorized connection attempt detected from IP address 118.69.76.169 to port 5555 [T] |
2020-04-05 04:56:13 |
| 210.178.75.32 | attackbotsspam | Unauthorized connection attempt detected from IP address 210.178.75.32 to port 23 |
2020-04-05 04:52:39 |
| 49.51.85.72 | attackspam | Apr 4 21:35:48 h2646465 sshd[29982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.85.72 user=root Apr 4 21:35:50 h2646465 sshd[29982]: Failed password for root from 49.51.85.72 port 38038 ssh2 Apr 4 21:45:49 h2646465 sshd[31313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.85.72 user=root Apr 4 21:45:51 h2646465 sshd[31313]: Failed password for root from 49.51.85.72 port 46172 ssh2 Apr 4 21:49:13 h2646465 sshd[31439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.85.72 user=root Apr 4 21:49:15 h2646465 sshd[31439]: Failed password for root from 49.51.85.72 port 57810 ssh2 Apr 4 21:52:47 h2646465 sshd[32016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.85.72 user=root Apr 4 21:52:49 h2646465 sshd[32016]: Failed password for root from 49.51.85.72 port 41220 ssh2 Apr 4 21:56:13 h2646465 sshd[32599]: pam_un |
2020-04-05 04:47:50 |
| 62.234.41.229 | attack | 6379/tcp [2020-04-04]1pkt |
2020-04-05 04:47:39 |
| 162.62.17.159 | attack | 8010/tcp 4711/tcp 8088/tcp... [2020-02-18/04-04]8pkt,7pt.(tcp) |
2020-04-05 04:39:19 |
| 79.113.246.7 | attackbotsspam | 61239/udp [2020-04-04]1pkt |
2020-04-05 05:12:06 |
| 51.161.51.150 | attack | 2020-04-04T13:31:05.148174shield sshd\[22679\]: Invalid user tz from 51.161.51.150 port 35080 2020-04-04T13:31:05.151985shield sshd\[22679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip150.ip-51-161-51.net 2020-04-04T13:31:06.884135shield sshd\[22679\]: Failed password for invalid user tz from 51.161.51.150 port 35080 ssh2 2020-04-04T13:34:47.481026shield sshd\[23239\]: Invalid user tanxjian from 51.161.51.150 port 46564 2020-04-04T13:34:47.491575shield sshd\[23239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip150.ip-51-161-51.net |
2020-04-05 04:43:08 |
| 150.109.180.250 | attackbots | trying to access non-authorized port |
2020-04-05 04:39:54 |
| 142.93.121.47 | attackbots | 2020-04-04T16:19:39.772238mail.thespaminator.com sshd[2455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.121.47 user=root 2020-04-04T16:19:41.514529mail.thespaminator.com sshd[2455]: Failed password for root from 142.93.121.47 port 60194 ssh2 ... |
2020-04-05 04:58:16 |
| 124.156.62.183 | attackspambots | 515/tcp 3389/tcp 2525/tcp... [2020-02-20/04-04]4pkt,4pt.(tcp) |
2020-04-05 04:36:32 |
| 201.236.182.92 | attack | 5x Failed Password |
2020-04-05 04:58:59 |
| 179.185.89.232 | attackbots | 2020-04-04T19:21:58.111669shield sshd\[15178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.89.232 user=root 2020-04-04T19:21:59.717939shield sshd\[15178\]: Failed password for root from 179.185.89.232 port 43616 ssh2 2020-04-04T19:26:23.586093shield sshd\[15999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.89.232 user=root 2020-04-04T19:26:25.905140shield sshd\[15999\]: Failed password for root from 179.185.89.232 port 50224 ssh2 2020-04-04T19:30:48.895874shield sshd\[16803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.89.232 user=root |
2020-04-05 05:02:59 |
| 107.170.204.148 | attackbotsspam | Apr 4 22:47:15 haigwepa sshd[305]: Failed password for root from 107.170.204.148 port 44126 ssh2 ... |
2020-04-05 05:00:32 |
| 58.187.67.169 | attackbots | 445/tcp [2020-04-04]1pkt |
2020-04-05 04:59:24 |
| 195.96.231.64 | attack | Invalid user bnz from 195.96.231.64 port 58004 |
2020-04-05 04:41:39 |