City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 97.114.124.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43068
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;97.114.124.150. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:14:04 CST 2025
;; MSG SIZE rcvd: 107
150.124.114.97.in-addr.arpa domain name pointer 97-114-124-150.nlrk.centurylink.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
150.124.114.97.in-addr.arpa name = 97-114-124-150.nlrk.centurylink.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 91.121.176.34 | attack | Sep 14 19:42:32 hpm sshd\[31556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.176.34 user=root Sep 14 19:42:34 hpm sshd\[31556\]: Failed password for root from 91.121.176.34 port 42216 ssh2 Sep 14 19:46:16 hpm sshd\[31825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.176.34 user=root Sep 14 19:46:18 hpm sshd\[31825\]: Failed password for root from 91.121.176.34 port 53882 ssh2 Sep 14 19:50:11 hpm sshd\[32118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.176.34 user=root |
2020-09-15 14:36:33 |
| 211.103.222.34 | attack | SSH-BruteForce |
2020-09-15 14:21:34 |
| 82.208.151.125 | attackspam | Port Scan ... |
2020-09-15 14:32:31 |
| 190.5.228.74 | attack | Sep 15 08:19:07 ip106 sshd[28465]: Failed password for root from 190.5.228.74 port 49325 ssh2 ... |
2020-09-15 14:34:23 |
| 218.92.0.138 | attackbotsspam | Sep 15 07:36:26 ajax sshd[6250]: Failed password for root from 218.92.0.138 port 14303 ssh2 Sep 15 07:36:31 ajax sshd[6250]: Failed password for root from 218.92.0.138 port 14303 ssh2 |
2020-09-15 14:39:25 |
| 157.245.200.68 | attackspambots | $f2bV_matches |
2020-09-15 14:38:08 |
| 122.161.241.122 | attackspam | bruteforce detected |
2020-09-15 14:27:38 |
| 156.54.168.71 | attackspam | SSH Brute-Force Attack |
2020-09-15 14:45:22 |
| 51.178.169.200 | attackspambots | Sep 15 08:24:38 ip106 sshd[28621]: Failed password for root from 51.178.169.200 port 47924 ssh2 Sep 15 08:30:50 ip106 sshd[28811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.169.200 ... |
2020-09-15 14:45:55 |
| 164.132.44.218 | attack | Sep 15 05:28:08 ip-172-31-16-56 sshd\[11049\]: Invalid user kingbon from 164.132.44.218\ Sep 15 05:28:10 ip-172-31-16-56 sshd\[11049\]: Failed password for invalid user kingbon from 164.132.44.218 port 35823 ssh2\ Sep 15 05:32:16 ip-172-31-16-56 sshd\[11076\]: Failed password for root from 164.132.44.218 port 44784 ssh2\ Sep 15 05:36:23 ip-172-31-16-56 sshd\[11114\]: Invalid user chrome from 164.132.44.218\ Sep 15 05:36:25 ip-172-31-16-56 sshd\[11114\]: Failed password for invalid user chrome from 164.132.44.218 port 53530 ssh2\ |
2020-09-15 14:42:12 |
| 193.35.51.21 | attackspambots | Sep 15 07:36:57 ns308116 postfix/smtpd[17643]: warning: unknown[193.35.51.21]: SASL LOGIN authentication failed: authentication failure Sep 15 07:36:57 ns308116 postfix/smtpd[17643]: warning: unknown[193.35.51.21]: SASL LOGIN authentication failed: authentication failure Sep 15 07:37:00 ns308116 postfix/smtpd[17643]: warning: unknown[193.35.51.21]: SASL LOGIN authentication failed: authentication failure Sep 15 07:37:00 ns308116 postfix/smtpd[17643]: warning: unknown[193.35.51.21]: SASL LOGIN authentication failed: authentication failure Sep 15 07:39:41 ns308116 postfix/smtpd[17643]: warning: unknown[193.35.51.21]: SASL LOGIN authentication failed: authentication failure Sep 15 07:39:41 ns308116 postfix/smtpd[17643]: warning: unknown[193.35.51.21]: SASL LOGIN authentication failed: authentication failure ... |
2020-09-15 14:54:47 |
| 193.169.255.41 | attackbotsspam | Rude login attack (13 tries in 1d) |
2020-09-15 14:54:30 |
| 167.250.49.216 | attack | Sep 15 08:13:28 ift sshd\[57274\]: Failed password for root from 167.250.49.216 port 47044 ssh2Sep 15 08:17:09 ift sshd\[57970\]: Invalid user postgres from 167.250.49.216Sep 15 08:17:10 ift sshd\[57970\]: Failed password for invalid user postgres from 167.250.49.216 port 46116 ssh2Sep 15 08:20:42 ift sshd\[58454\]: Invalid user chad from 167.250.49.216Sep 15 08:20:44 ift sshd\[58454\]: Failed password for invalid user chad from 167.250.49.216 port 45194 ssh2 ... |
2020-09-15 14:24:06 |
| 93.236.95.59 | attackbots | (sshd) Failed SSH login from 93.236.95.59 (DE/Germany/Bavaria/A-Burg/p5dec5f3b.dip0.t-ipconnect.de): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 14 14:10:03 atlas sshd[17435]: Invalid user samouris from 93.236.95.59 port 39234 Sep 14 14:10:06 atlas sshd[17435]: Failed password for invalid user samouris from 93.236.95.59 port 39234 ssh2 Sep 14 14:20:25 atlas sshd[19804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.236.95.59 user=root Sep 14 14:20:27 atlas sshd[19804]: Failed password for root from 93.236.95.59 port 41314 ssh2 Sep 14 14:28:28 atlas sshd[22047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.236.95.59 user=root |
2020-09-15 14:45:41 |
| 181.28.152.133 | attackspambots | Sep 15 06:52:58 server sshd[2618]: Failed password for root from 181.28.152.133 port 36283 ssh2 Sep 15 07:04:59 server sshd[8506]: Failed password for root from 181.28.152.133 port 46319 ssh2 Sep 15 07:19:40 server sshd[15398]: Failed password for root from 181.28.152.133 port 58085 ssh2 |
2020-09-15 14:20:14 |