City: unknown
Region: unknown
Country: Kazakhstan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.57.241.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36220
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;95.57.241.40. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 04:37:25 CST 2025
;; MSG SIZE rcvd: 105
40.241.57.95.in-addr.arpa domain name pointer 95.57.241.40.dynamic.telecom.kz.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.241.57.95.in-addr.arpa name = 95.57.241.40.dynamic.telecom.kz.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 138.68.12.43 | attack | Aug 9 14:34:39 xtremcommunity sshd\[27926\]: Invalid user download from 138.68.12.43 port 52668 Aug 9 14:34:39 xtremcommunity sshd\[27926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.12.43 Aug 9 14:34:40 xtremcommunity sshd\[27926\]: Failed password for invalid user download from 138.68.12.43 port 52668 ssh2 Aug 9 14:41:14 xtremcommunity sshd\[28192\]: Invalid user stephan from 138.68.12.43 port 46272 Aug 9 14:41:14 xtremcommunity sshd\[28192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.12.43 ... |
2019-08-10 02:53:48 |
| 23.129.64.181 | attack | Aug 9 20:57:57 localhost sshd\[8407\]: Invalid user sconsole from 23.129.64.181 port 15918 Aug 9 20:57:57 localhost sshd\[8407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.181 Aug 9 20:57:59 localhost sshd\[8407\]: Failed password for invalid user sconsole from 23.129.64.181 port 15918 ssh2 |
2019-08-10 03:13:20 |
| 138.68.155.9 | attackbotsspam | Brute force SMTP login attempted. ... |
2019-08-10 02:45:26 |
| 178.128.121.188 | attack | Aug 9 19:30:21 amit sshd\[8513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.188 user=root Aug 9 19:30:23 amit sshd\[8513\]: Failed password for root from 178.128.121.188 port 55288 ssh2 Aug 9 19:36:08 amit sshd\[15517\]: Invalid user claudio from 178.128.121.188 ... |
2019-08-10 02:52:50 |
| 62.43.152.233 | attack | Aug 9 19:35:20 v22018076622670303 sshd\[2867\]: Invalid user pi from 62.43.152.233 port 55602 Aug 9 19:35:20 v22018076622670303 sshd\[2869\]: Invalid user pi from 62.43.152.233 port 55608 Aug 9 19:35:21 v22018076622670303 sshd\[2867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.43.152.233 ... |
2019-08-10 03:29:51 |
| 181.22.179.31 | attackspambots | Lines containing failures of 181.22.179.31 Aug 9 19:21:58 shared12 sshd[6892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.22.179.31 user=r.r Aug 9 19:22:00 shared12 sshd[6892]: Failed password for r.r from 181.22.179.31 port 41863 ssh2 Aug 9 19:22:03 shared12 sshd[6892]: Failed password for r.r from 181.22.179.31 port 41863 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=181.22.179.31 |
2019-08-10 03:21:34 |
| 138.197.199.249 | attackspambots | Brute force SMTP login attempted. ... |
2019-08-10 03:10:11 |
| 45.65.65.18 | attackspam | 2019-08-09 12:35:25 H=(litoexpress.it) [45.65.65.18]:48794 I=[192.147.25.65]:25 F= |
2019-08-10 03:25:15 |
| 138.197.180.16 | attackbotsspam | Brute force SMTP login attempted. ... |
2019-08-10 03:15:23 |
| 165.227.210.71 | attackspambots | k+ssh-bruteforce |
2019-08-10 02:59:18 |
| 149.56.13.165 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.13.165 Failed password for invalid user ftproot from 149.56.13.165 port 37484 ssh2 Invalid user rs from 149.56.13.165 port 34666 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.13.165 Failed password for invalid user rs from 149.56.13.165 port 34666 ssh2 |
2019-08-10 02:53:22 |
| 164.132.56.243 | attack | Aug 9 20:27:23 dedicated sshd[10510]: Invalid user membership from 164.132.56.243 port 57851 |
2019-08-10 02:47:05 |
| 2.78.57.243 | attackbots | Aug 9 20:04:23 mail sshd\[27940\]: Failed password for invalid user ubuntu from 2.78.57.243 port 44320 ssh2 Aug 9 20:24:37 mail sshd\[28277\]: Invalid user sftp from 2.78.57.243 port 53874 Aug 9 20:24:37 mail sshd\[28277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.78.57.243 ... |
2019-08-10 03:28:24 |
| 138.219.254.68 | attackbotsspam | Brute force SMTP login attempted. ... |
2019-08-10 02:55:34 |
| 115.90.219.20 | attackspambots | Aug 9 21:04:57 MK-Soft-Root1 sshd\[21348\]: Invalid user tecnici from 115.90.219.20 port 43618 Aug 9 21:04:57 MK-Soft-Root1 sshd\[21348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.90.219.20 Aug 9 21:04:59 MK-Soft-Root1 sshd\[21348\]: Failed password for invalid user tecnici from 115.90.219.20 port 43618 ssh2 ... |
2019-08-10 03:07:20 |