City: unknown
Region: unknown
Country: French Guiana
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.142.25.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24152
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;92.142.25.55.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 22:19:57 CST 2025
;; MSG SIZE  rcvd: 105
        55.25.142.92.in-addr.arpa domain name pointer lfbn-cay-1-47-55.w92-142.abo.wanadoo.fr.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
55.25.142.92.in-addr.arpa	name = lfbn-cay-1-47-55.w92-142.abo.wanadoo.fr.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 132.232.66.238 | attackbots | May 23 19:38:42 ajax sshd[30398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.66.238 May 23 19:38:44 ajax sshd[30398]: Failed password for invalid user pbz from 132.232.66.238 port 56136 ssh2  | 
                    2020-05-24 02:49:14 | 
| 36.67.32.45 | attackbotsspam | Invalid user shb from 36.67.32.45 port 47668  | 
                    2020-05-24 03:04:07 | 
| 118.200.41.3 | attack | Invalid user dgi from 118.200.41.3 port 51760  | 
                    2020-05-24 02:51:44 | 
| 49.235.252.236 | attack | Invalid user mse from 49.235.252.236 port 42094  | 
                    2020-05-24 03:00:41 | 
| 60.255.174.150 | attack | Invalid user amy from 60.255.174.150 port 41624  | 
                    2020-05-24 02:57:26 | 
| 106.12.18.168 | attackbots | Lines containing failures of 106.12.18.168 May 21 16:33:07 shared10 sshd[3211]: Invalid user dfu from 106.12.18.168 port 57104 May 21 16:33:07 shared10 sshd[3211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.18.168 May 21 16:33:09 shared10 sshd[3211]: Failed password for invalid user dfu from 106.12.18.168 port 57104 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=106.12.18.168  | 
                    2020-05-24 02:54:13 | 
| 37.187.100.50 | attackspambots | SSH Brute Force  | 
                    2020-05-24 02:37:55 | 
| 220.132.75.140 | attackspam | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)  | 
                    2020-05-24 03:06:38 | 
| 107.182.177.173 | attackspam | May 23 17:50:06 Ubuntu-1404-trusty-64-minimal sshd\[16703\]: Invalid user hfx from 107.182.177.173 May 23 17:50:06 Ubuntu-1404-trusty-64-minimal sshd\[16703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.177.173 May 23 17:50:08 Ubuntu-1404-trusty-64-minimal sshd\[16703\]: Failed password for invalid user hfx from 107.182.177.173 port 49848 ssh2 May 23 18:19:43 Ubuntu-1404-trusty-64-minimal sshd\[7874\]: Invalid user gxz from 107.182.177.173 May 23 18:19:43 Ubuntu-1404-trusty-64-minimal sshd\[7874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.177.173  | 
                    2020-05-24 02:53:30 | 
| 123.31.41.20 | attack | Invalid user fcp from 123.31.41.20 port 43298  | 
                    2020-05-24 02:49:59 | 
| 82.165.100.56 | attackspambots | May 23 20:15:14 lnxded64 sshd[29929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.100.56  | 
                    2020-05-24 02:56:29 | 
| 109.19.90.178 | attackbotsspam | Failed password for invalid user eqy from 109.19.90.178 port 8125 ssh2  | 
                    2020-05-24 02:53:08 | 
| 64.227.2.96 | attackspambots | May 23 20:48:20 OPSO sshd\[22934\]: Invalid user kzr from 64.227.2.96 port 54440 May 23 20:48:20 OPSO sshd\[22934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.2.96 May 23 20:48:21 OPSO sshd\[22934\]: Failed password for invalid user kzr from 64.227.2.96 port 54440 ssh2 May 23 20:52:55 OPSO sshd\[23756\]: Invalid user pda from 64.227.2.96 port 60332 May 23 20:52:55 OPSO sshd\[23756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.2.96  | 
                    2020-05-24 02:57:14 | 
| 49.235.218.147 | attack | May 23 15:41:48 lnxded63 sshd[19774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.218.147  | 
                    2020-05-24 02:34:13 | 
| 111.67.193.170 | attackspam | Invalid user mne from 111.67.193.170 port 54618  | 
                    2020-05-24 02:52:49 |