City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.117.20.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43186
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.117.20.77. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 00:02:03 CST 2025
;; MSG SIZE rcvd: 105
77.20.117.99.in-addr.arpa domain name pointer 99-117-20-77.lightspeed.tulsok.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
77.20.117.99.in-addr.arpa name = 99-117-20-77.lightspeed.tulsok.sbcglobal.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 125.99.46.47 | attack | Apr 5 05:36:49 icinga sshd[42047]: Failed password for root from 125.99.46.47 port 59310 ssh2 Apr 5 05:50:44 icinga sshd[65090]: Failed password for root from 125.99.46.47 port 44146 ssh2 ... |
2020-04-05 15:08:39 |
| 125.124.193.237 | attackspam | Apr 5 08:33:42 srv206 sshd[12625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.193.237 user=root Apr 5 08:33:44 srv206 sshd[12625]: Failed password for root from 125.124.193.237 port 57438 ssh2 Apr 5 08:40:24 srv206 sshd[12676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.193.237 user=root Apr 5 08:40:26 srv206 sshd[12676]: Failed password for root from 125.124.193.237 port 38848 ssh2 ... |
2020-04-05 15:41:12 |
| 2607:5300:60:56c3:: | attackspam | Apr 5 07:48:55 wordpress wordpress(www.ruhnke.cloud)[2819]: Blocked authentication attempt for admin from 2607:5300:60:56c3:: |
2020-04-05 15:38:48 |
| 219.144.67.60 | attack | Apr 5 06:45:30 host01 sshd[26304]: Failed password for root from 219.144.67.60 port 32778 ssh2 Apr 5 06:49:32 host01 sshd[27045]: Failed password for root from 219.144.67.60 port 51698 ssh2 ... |
2020-04-05 14:59:58 |
| 5.10.107.179 | attackspambots | Lines containing failures of 5.10.107.179 Apr 3 14:32:00 penfold sshd[11748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.10.107.179 user=r.r Apr 3 14:32:01 penfold sshd[11748]: Failed password for r.r from 5.10.107.179 port 20666 ssh2 Apr 3 14:32:02 penfold sshd[11748]: Received disconnect from 5.10.107.179 port 20666:11: Bye Bye [preauth] Apr 3 14:32:02 penfold sshd[11748]: Disconnected from authenticating user r.r 5.10.107.179 port 20666 [preauth] Apr 3 14:42:41 penfold sshd[13020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.10.107.179 user=r.r Apr 3 14:42:43 penfold sshd[13020]: Failed password for r.r from 5.10.107.179 port 51358 ssh2 Apr 3 14:42:45 penfold sshd[13020]: Received disconnect from 5.10.107.179 port 51358:11: Bye Bye [preauth] Apr 3 14:42:45 penfold sshd[13020]: Disconnected from authenticating user r.r 5.10.107.179 port 51358 [preauth] Apr 3 14:46:58........ ------------------------------ |
2020-04-05 15:22:14 |
| 122.44.99.227 | attackspambots | ssh brute force |
2020-04-05 15:20:13 |
| 222.186.31.83 | attackspambots | Apr 5 07:32:23 localhost sshd\[779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83 user=root Apr 5 07:32:24 localhost sshd\[779\]: Failed password for root from 222.186.31.83 port 24951 ssh2 Apr 5 07:32:27 localhost sshd\[779\]: Failed password for root from 222.186.31.83 port 24951 ssh2 ... |
2020-04-05 15:37:33 |
| 190.52.191.49 | attackbotsspam | $f2bV_matches |
2020-04-05 15:12:20 |
| 222.180.162.8 | attackspambots | SSH Brute Force |
2020-04-05 15:05:24 |
| 106.12.122.138 | attackbots | $f2bV_matches |
2020-04-05 15:21:00 |
| 222.122.31.133 | attackbots | SSH auth scanning - multiple failed logins |
2020-04-05 15:20:44 |
| 185.181.102.18 | attackbotsspam | Fail2Ban Ban Triggered |
2020-04-05 15:00:17 |
| 198.199.115.94 | attack | Apr 5 10:49:06 itv-usvr-01 sshd[11476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.115.94 user=root Apr 5 10:49:08 itv-usvr-01 sshd[11476]: Failed password for root from 198.199.115.94 port 36470 ssh2 Apr 5 10:54:35 itv-usvr-01 sshd[11707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.115.94 user=root Apr 5 10:54:37 itv-usvr-01 sshd[11707]: Failed password for root from 198.199.115.94 port 37576 ssh2 |
2020-04-05 15:18:52 |
| 213.183.101.89 | attack | frenzy |
2020-04-05 15:29:40 |
| 190.111.122.166 | attackspambots | Unauthorized connection attempt detected from IP address 190.111.122.166 to port 1433 |
2020-04-05 15:06:17 |