City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.214.16.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61155
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.214.16.129. IN A
;; AUTHORITY SECTION:
. 37 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:57:36 CST 2022
;; MSG SIZE rcvd: 107
129.16.214.107.in-addr.arpa domain name pointer 107-214-16-129.lightspeed.rcsntx.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
129.16.214.107.in-addr.arpa name = 107-214-16-129.lightspeed.rcsntx.sbcglobal.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
104.236.81.204 | attackbotsspam | Nov 11 20:11:38 localhost sshd\[3217\]: Invalid user oracle1 from 104.236.81.204 port 59817 Nov 11 20:11:38 localhost sshd\[3217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.81.204 Nov 11 20:11:40 localhost sshd\[3217\]: Failed password for invalid user oracle1 from 104.236.81.204 port 59817 ssh2 ... |
2019-11-12 05:04:10 |
81.22.45.190 | attackbotsspam | 2019-11-11T21:41:31.225577+01:00 lumpi kernel: [3327268.972427] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.190 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=38034 PROTO=TCP SPT=45479 DPT=61498 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-11-12 04:54:26 |
180.96.69.215 | attackspam | 2019-11-09 07:14:08 server sshd[37267]: Failed password for invalid user test from 180.96.69.215 port 40564 ssh2 |
2019-11-12 04:42:43 |
210.105.192.76 | attack | SSH Brute Force, server-1 sshd[9547]: Failed password for invalid user qhsupport from 210.105.192.76 port 35074 ssh2 |
2019-11-12 04:37:44 |
116.107.186.132 | attackbots | Honeypot attack, port: 445, PTR: dynamic-adsl.viettel.vn. |
2019-11-12 04:54:02 |
189.7.129.60 | attack | SSH Brute Force |
2019-11-12 05:07:14 |
46.38.144.202 | attack | 2019-11-11T21:36:37.101770mail01 postfix/smtpd[20570]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-11T21:37:03.106168mail01 postfix/smtpd[3248]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-11-11T21:37:29.148464mail01 postfix/smtpd[20570]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-11-12 04:58:39 |
222.82.237.238 | attackbots | Nov 11 16:59:50 lnxmysql61 sshd[28055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.82.237.238 |
2019-11-12 04:39:04 |
132.232.255.50 | attack | Nov 11 20:54:15 lnxweb61 sshd[11741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.255.50 Nov 11 20:54:17 lnxweb61 sshd[11741]: Failed password for invalid user dargahi from 132.232.255.50 port 53606 ssh2 Nov 11 20:59:59 lnxweb61 sshd[16522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.255.50 |
2019-11-12 04:32:56 |
95.211.95.45 | attackbots | 19/11/11@09:37:11: FAIL: Alarm-Intrusion address from=95.211.95.45 ... |
2019-11-12 05:08:21 |
129.28.97.252 | attack | Invalid user arleta from 129.28.97.252 port 59786 |
2019-11-12 04:32:36 |
190.9.130.159 | attackbotsspam | Nov 11 21:34:03 h2177944 sshd\[20923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.9.130.159 user=root Nov 11 21:34:05 h2177944 sshd\[20923\]: Failed password for root from 190.9.130.159 port 38623 ssh2 Nov 11 21:38:56 h2177944 sshd\[21225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.9.130.159 user=root Nov 11 21:38:58 h2177944 sshd\[21225\]: Failed password for root from 190.9.130.159 port 57112 ssh2 ... |
2019-11-12 04:55:09 |
80.211.132.145 | attack | 2019-11-11T20:36:34.327599abusebot-5.cloudsearch.cf sshd\[6387\]: Invalid user helli from 80.211.132.145 port 44158 |
2019-11-12 04:55:59 |
59.124.104.157 | attackbotsspam | Nov 11 18:15:44 v22018086721571380 sshd[18981]: Failed password for invalid user Passowrd01 from 59.124.104.157 port 34200 ssh2 Nov 11 19:20:14 v22018086721571380 sshd[21125]: Failed password for invalid user ricky from 59.124.104.157 port 40089 ssh2 |
2019-11-12 04:54:43 |
81.22.45.152 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 5689 proto: TCP cat: Misc Attack |
2019-11-12 05:02:59 |