City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.42.214.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3787
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.42.214.34. IN A
;; AUTHORITY SECTION:
. 384 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022041300 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 13 22:34:01 CST 2022
;; MSG SIZE rcvd: 106
Host 34.214.42.106.in-addr.arpa not found: 2(SERVFAIL)
server can't find 106.42.214.34.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
159.203.201.136 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-01-10 21:29:17 |
15.185.66.47 | attack | ICMP MH Probe, Scan /Distributed - |
2020-01-10 21:17:05 |
118.254.230.68 | attackbotsspam | firewall-block, port(s): 8000/udp |
2020-01-10 21:53:03 |
14.215.176.178 | attackspam | ICMP MH Probe, Scan /Distributed - |
2020-01-10 21:35:34 |
223.80.109.81 | attackbotsspam | Jan 10 14:31:25 [host] sshd[31911]: Invalid user ftpadmin from 223.80.109.81 Jan 10 14:31:25 [host] sshd[31911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.80.109.81 Jan 10 14:31:27 [host] sshd[31911]: Failed password for invalid user ftpadmin from 223.80.109.81 port 38436 ssh2 |
2020-01-10 21:34:08 |
213.6.172.134 | attackbots | 01/10/2020-08:46:20.612558 213.6.172.134 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 22 |
2020-01-10 21:49:09 |
195.219.98.40 | attackspambots | [09/Jan/2020:09:38:05 -0500] "GET / HTTP/1.1" Chrome 52.0 UA |
2020-01-10 21:45:10 |
111.93.235.74 | attack | Too many connections or unauthorized access detected from Arctic banned ip |
2020-01-10 21:43:39 |
49.234.60.177 | attack | [ssh] SSH attack |
2020-01-10 21:20:14 |
213.138.73.250 | attackspam | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-01-10 22:01:35 |
14.215.176.179 | attackspam | ICMP MH Probe, Scan /Distributed - |
2020-01-10 21:33:42 |
31.215.203.95 | attackspambots | Malicious/Probing: /wp-login.php |
2020-01-10 21:56:57 |
1.203.115.141 | attackspambots | Jan 10 14:25:40 meumeu sshd[10647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.115.141 Jan 10 14:25:43 meumeu sshd[10647]: Failed password for invalid user mkm from 1.203.115.141 port 51124 ssh2 Jan 10 14:28:19 meumeu sshd[11122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.115.141 ... |
2020-01-10 21:41:12 |
14.215.176.180 | attack | ICMP MH Probe, Scan /Distributed - |
2020-01-10 21:32:16 |
35.231.6.102 | attack | Jan 10 14:19:15 SilenceServices sshd[16729]: Failed password for root from 35.231.6.102 port 48848 ssh2 Jan 10 14:22:41 SilenceServices sshd[19534]: Failed password for sys from 35.231.6.102 port 54044 ssh2 |
2020-01-10 21:25:36 |