City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.47.251.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48478
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.47.251.75. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 09:23:36 CST 2025
;; MSG SIZE rcvd: 105
75.251.47.99.in-addr.arpa domain name pointer 99-47-251-75.lightspeed.clmboh.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
75.251.47.99.in-addr.arpa name = 99-47-251-75.lightspeed.clmboh.sbcglobal.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 65.155.9.82 | attackspambots | Brute forcing email accounts |
2020-06-12 13:25:12 |
| 92.255.110.146 | attack | Jun 12 07:10:11 h1745522 sshd[5819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.110.146 user=root Jun 12 07:10:13 h1745522 sshd[5819]: Failed password for root from 92.255.110.146 port 60398 ssh2 Jun 12 07:12:44 h1745522 sshd[5983]: Invalid user test from 92.255.110.146 port 1083 Jun 12 07:12:44 h1745522 sshd[5983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.110.146 Jun 12 07:12:44 h1745522 sshd[5983]: Invalid user test from 92.255.110.146 port 1083 Jun 12 07:12:46 h1745522 sshd[5983]: Failed password for invalid user test from 92.255.110.146 port 1083 ssh2 Jun 12 07:15:21 h1745522 sshd[6074]: Invalid user lusifen from 92.255.110.146 port 35296 Jun 12 07:15:21 h1745522 sshd[6074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.110.146 Jun 12 07:15:21 h1745522 sshd[6074]: Invalid user lusifen from 92.255.110.146 port 35296 Jun 12 07:15: ... |
2020-06-12 13:16:22 |
| 106.37.178.172 | attackbotsspam | Port probing on unauthorized port 1433 |
2020-06-12 13:45:55 |
| 101.89.123.47 | attack | " " |
2020-06-12 13:16:48 |
| 46.38.150.190 | attack | 2020-06-11T22:52:36.759180linuxbox-skyline auth[327020]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=deimos rhost=46.38.150.190 ... |
2020-06-12 12:56:01 |
| 222.186.173.201 | attack | Jun 12 06:52:16 sd-69548 sshd[1321175]: Unable to negotiate with 222.186.173.201 port 39476: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Jun 12 07:10:18 sd-69548 sshd[1322475]: Unable to negotiate with 222.186.173.201 port 16498: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... |
2020-06-12 13:13:28 |
| 46.38.150.142 | attackbots | Jun 12 07:16:58 srv01 postfix/smtpd\[3040\]: warning: unknown\[46.38.150.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 12 07:17:11 srv01 postfix/smtpd\[32096\]: warning: unknown\[46.38.150.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 12 07:17:48 srv01 postfix/smtpd\[11265\]: warning: unknown\[46.38.150.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 12 07:17:51 srv01 postfix/smtpd\[3040\]: warning: unknown\[46.38.150.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 12 07:18:00 srv01 postfix/smtpd\[32096\]: warning: unknown\[46.38.150.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-06-12 13:18:05 |
| 49.149.0.167 | attackspam | Unauthorised access (Jun 12) SRC=49.149.0.167 LEN=52 PREC=0x20 TTL=119 ID=25893 DF TCP DPT=445 WINDOW=8192 SYN |
2020-06-12 13:46:31 |
| 218.78.81.207 | attackspam | Invalid user savanh from 218.78.81.207 port 48196 |
2020-06-12 13:03:55 |
| 182.73.75.69 | attackspambots | Unauthorised access (Jun 12) SRC=182.73.75.69 LEN=52 TTL=116 ID=30209 DF TCP DPT=445 WINDOW=8192 SYN |
2020-06-12 12:54:15 |
| 118.70.72.103 | attack | Jun 12 07:01:24 minden010 sshd[2459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.72.103 Jun 12 07:01:27 minden010 sshd[2459]: Failed password for invalid user csserver from 118.70.72.103 port 48394 ssh2 Jun 12 07:05:20 minden010 sshd[3406]: Failed password for root from 118.70.72.103 port 38922 ssh2 ... |
2020-06-12 13:08:48 |
| 106.13.188.35 | attack | Brute-force attempt banned |
2020-06-12 13:38:49 |
| 209.141.44.67 | attack | Invalid user git from 209.141.44.67 port 34396 |
2020-06-12 13:18:55 |
| 218.28.21.236 | attack | reported through recidive - multiple failed attempts(SSH) |
2020-06-12 12:59:12 |
| 51.38.186.180 | attack | Jun 12 07:59:36 lukav-desktop sshd\[10541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.180 user=www-data Jun 12 07:59:38 lukav-desktop sshd\[10541\]: Failed password for www-data from 51.38.186.180 port 42429 ssh2 Jun 12 08:02:52 lukav-desktop sshd\[10642\]: Invalid user jigang from 51.38.186.180 Jun 12 08:02:52 lukav-desktop sshd\[10642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.180 Jun 12 08:02:54 lukav-desktop sshd\[10642\]: Failed password for invalid user jigang from 51.38.186.180 port 42410 ssh2 |
2020-06-12 13:21:21 |