City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.14.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41820
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.14.54. IN A
;; AUTHORITY SECTION:
. 133 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 18:02:43 CST 2022
;; MSG SIZE rcvd: 105
Host 54.14.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 54.14.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
40.121.58.88 | attackbots | Jun 25 09:24:52 *** sshd[16733]: User root from 40.121.58.88 not allowed because not listed in AllowUsers |
2020-06-25 17:47:29 |
112.85.42.172 | attackspam | Jun 25 11:46:08 server sshd[45659]: Failed none for root from 112.85.42.172 port 44418 ssh2 Jun 25 11:46:11 server sshd[45659]: Failed password for root from 112.85.42.172 port 44418 ssh2 Jun 25 11:46:15 server sshd[45659]: Failed password for root from 112.85.42.172 port 44418 ssh2 |
2020-06-25 17:57:59 |
45.71.124.126 | attackbotsspam | Jun 25 02:07:00 NPSTNNYC01T sshd[10241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.71.124.126 Jun 25 02:07:01 NPSTNNYC01T sshd[10241]: Failed password for invalid user paras from 45.71.124.126 port 58162 ssh2 Jun 25 02:10:56 NPSTNNYC01T sshd[10621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.71.124.126 ... |
2020-06-25 17:19:55 |
128.199.199.159 | attackspam | Failed password for invalid user iga from 128.199.199.159 port 43308 ssh2 |
2020-06-25 17:57:36 |
194.26.29.231 | attack | Jun 25 10:55:28 debian-2gb-nbg1-2 kernel: \[15333990.674194\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.231 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=28211 PROTO=TCP SPT=58851 DPT=33893 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-25 17:57:16 |
103.219.195.79 | attackbotsspam | Jun 25 10:24:25 ajax sshd[12060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.195.79 Jun 25 10:24:27 ajax sshd[12060]: Failed password for invalid user maestro from 103.219.195.79 port 35093 ssh2 |
2020-06-25 17:58:25 |
94.102.51.95 | attackbots | Port scan on 6 port(s): 17474 47708 55938 61511 61626 64812 |
2020-06-25 17:34:17 |
111.229.122.177 | attackbotsspam | Jun 25 08:04:33 OPSO sshd\[32679\]: Invalid user user03 from 111.229.122.177 port 34542 Jun 25 08:04:33 OPSO sshd\[32679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.122.177 Jun 25 08:04:34 OPSO sshd\[32679\]: Failed password for invalid user user03 from 111.229.122.177 port 34542 ssh2 Jun 25 08:11:21 OPSO sshd\[2468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.122.177 user=root Jun 25 08:11:23 OPSO sshd\[2468\]: Failed password for root from 111.229.122.177 port 46646 ssh2 |
2020-06-25 17:46:12 |
187.190.161.134 | attackspambots | 21 attempts against mh-ssh on flow |
2020-06-25 17:47:55 |
223.149.252.92 | attack | Automatic report - Port Scan Attack |
2020-06-25 17:42:48 |
154.208.143.15 | attackbotsspam | SSH_attack |
2020-06-25 17:40:36 |
159.65.155.255 | attackspambots | Jun 25 10:09:12 cdc sshd[23332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.255 Jun 25 10:09:14 cdc sshd[23332]: Failed password for invalid user aaron from 159.65.155.255 port 55760 ssh2 |
2020-06-25 17:21:42 |
103.60.212.2 | attackbots | Jun 25 15:56:37 webhost01 sshd[19966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.212.2 Jun 25 15:56:39 webhost01 sshd[19966]: Failed password for invalid user ftp from 103.60.212.2 port 33840 ssh2 ... |
2020-06-25 17:22:07 |
222.186.180.147 | attackbotsspam | Jun 25 11:05:41 abendstille sshd\[13431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147 user=root Jun 25 11:05:43 abendstille sshd\[13431\]: Failed password for root from 222.186.180.147 port 7732 ssh2 Jun 25 11:05:47 abendstille sshd\[13431\]: Failed password for root from 222.186.180.147 port 7732 ssh2 Jun 25 11:05:52 abendstille sshd\[13431\]: Failed password for root from 222.186.180.147 port 7732 ssh2 Jun 25 11:05:56 abendstille sshd\[13431\]: Failed password for root from 222.186.180.147 port 7732 ssh2 ... |
2020-06-25 17:23:04 |
189.202.204.230 | attackbots | 2020-06-25T09:59:30.708640amanda2.illicoweb.com sshd\[26217\]: Failed password for root from 189.202.204.230 port 54244 ssh2 2020-06-25T10:03:29.152396amanda2.illicoweb.com sshd\[26384\]: Invalid user test from 189.202.204.230 port 53600 2020-06-25T10:03:29.156957amanda2.illicoweb.com sshd\[26384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.202.204.230 2020-06-25T10:03:31.771796amanda2.illicoweb.com sshd\[26384\]: Failed password for invalid user test from 189.202.204.230 port 53600 ssh2 2020-06-25T10:07:10.909143amanda2.illicoweb.com sshd\[26785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.202.204.230 user=root ... |
2020-06-25 17:43:20 |