City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.139.1.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63712
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;108.139.1.14. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022052301 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 24 02:30:38 CST 2022
;; MSG SIZE rcvd: 105
14.1.139.108.in-addr.arpa domain name pointer server-108-139-1-14.sfo5.r.cloudfront.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.1.139.108.in-addr.arpa name = server-108-139-1-14.sfo5.r.cloudfront.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
122.170.108.228 | attackspambots | May 6 22:23:23 cloud sshd[2251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.170.108.228 May 6 22:23:25 cloud sshd[2251]: Failed password for invalid user telnet from 122.170.108.228 port 60498 ssh2 |
2020-05-07 04:35:53 |
190.64.89.218 | attack | Automatic report - Windows Brute-Force Attack |
2020-05-07 04:30:30 |
51.255.168.254 | attackspambots | May 6 16:36:28 ny01 sshd[19153]: Failed password for root from 51.255.168.254 port 43816 ssh2 May 6 16:39:47 ny01 sshd[19573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.254 May 6 16:39:49 ny01 sshd[19573]: Failed password for invalid user wxd from 51.255.168.254 port 50232 ssh2 |
2020-05-07 04:43:37 |
51.79.55.87 | attack | May 6 20:13:03 saturn sshd[9276]: Failed password for invalid user cuenca from 51.79.55.87 port 49638 ssh2 May 6 20:23:34 saturn sshd[9681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.55.87 user=root May 6 20:23:36 saturn sshd[9681]: Failed password for root from 51.79.55.87 port 55576 ssh2 ... |
2020-05-07 04:27:36 |
218.232.135.95 | attackbots | May 6 22:50:24 eventyay sshd[24506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.232.135.95 May 6 22:50:26 eventyay sshd[24506]: Failed password for invalid user support from 218.232.135.95 port 60174 ssh2 May 6 22:54:23 eventyay sshd[24599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.232.135.95 ... |
2020-05-07 04:54:33 |
37.59.36.210 | attackbotsspam | May 6 22:36:24 inter-technics sshd[8813]: Invalid user gitlab-runner from 37.59.36.210 port 44176 May 6 22:36:24 inter-technics sshd[8813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.36.210 May 6 22:36:24 inter-technics sshd[8813]: Invalid user gitlab-runner from 37.59.36.210 port 44176 May 6 22:36:26 inter-technics sshd[8813]: Failed password for invalid user gitlab-runner from 37.59.36.210 port 44176 ssh2 May 6 22:43:09 inter-technics sshd[11358]: Invalid user nagios from 37.59.36.210 port 53838 ... |
2020-05-07 04:50:06 |
54.37.14.3 | attackspam | May 6 22:25:14 legacy sshd[11515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.14.3 May 6 22:25:16 legacy sshd[11515]: Failed password for invalid user company from 54.37.14.3 port 52512 ssh2 May 6 22:30:54 legacy sshd[11793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.14.3 ... |
2020-05-07 04:37:29 |
198.245.51.185 | attack | 2020-05-06T20:50:42.681860shield sshd\[28710\]: Invalid user it from 198.245.51.185 port 51650 2020-05-06T20:50:42.685758shield sshd\[28710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns544607.ip-198-245-51.net 2020-05-06T20:50:44.743527shield sshd\[28710\]: Failed password for invalid user it from 198.245.51.185 port 51650 ssh2 2020-05-06T20:54:10.537825shield sshd\[29375\]: Invalid user test from 198.245.51.185 port 32902 2020-05-06T20:54:10.542106shield sshd\[29375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns544607.ip-198-245-51.net |
2020-05-07 04:55:15 |
194.1.168.36 | attackbots | May 6 22:27:24 sip sshd[141619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.1.168.36 May 6 22:27:24 sip sshd[141619]: Invalid user ckl from 194.1.168.36 port 37904 May 6 22:27:26 sip sshd[141619]: Failed password for invalid user ckl from 194.1.168.36 port 37904 ssh2 ... |
2020-05-07 04:43:59 |
129.211.65.70 | attack | srv02 SSH BruteForce Attacks 22 .. |
2020-05-07 04:26:20 |
196.219.93.130 | attackbots | 1,02-10/02 [bc00/m01] PostRequest-Spammer scoring: vaduz |
2020-05-07 04:39:44 |
61.177.172.128 | attack | May 6 20:31:32 localhost sshd[32182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128 user=root May 6 20:31:33 localhost sshd[32182]: Failed password for root from 61.177.172.128 port 11365 ssh2 May 6 20:31:37 localhost sshd[32182]: Failed password for root from 61.177.172.128 port 11365 ssh2 May 6 20:31:32 localhost sshd[32182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128 user=root May 6 20:31:33 localhost sshd[32182]: Failed password for root from 61.177.172.128 port 11365 ssh2 May 6 20:31:37 localhost sshd[32182]: Failed password for root from 61.177.172.128 port 11365 ssh2 May 6 20:31:32 localhost sshd[32182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128 user=root May 6 20:31:33 localhost sshd[32182]: Failed password for root from 61.177.172.128 port 11365 ssh2 May 6 20:31:37 localhost sshd[32182]: Fa ... |
2020-05-07 04:38:58 |
167.71.228.227 | attack | May 6 20:07:45 l02a sshd[24676]: Invalid user dmarc from 167.71.228.227 May 6 20:07:45 l02a sshd[24676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.228.227 May 6 20:07:45 l02a sshd[24676]: Invalid user dmarc from 167.71.228.227 May 6 20:07:47 l02a sshd[24676]: Failed password for invalid user dmarc from 167.71.228.227 port 53360 ssh2 |
2020-05-07 04:23:28 |
66.70.130.149 | attackbots | May 6 22:14:10 OPSO sshd\[22978\]: Invalid user super from 66.70.130.149 port 33252 May 6 22:14:10 OPSO sshd\[22978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.149 May 6 22:14:12 OPSO sshd\[22978\]: Failed password for invalid user super from 66.70.130.149 port 33252 ssh2 May 6 22:23:26 OPSO sshd\[25307\]: Invalid user cgh from 66.70.130.149 port 38042 May 6 22:23:26 OPSO sshd\[25307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.149 |
2020-05-07 04:34:28 |
27.74.253.80 | attack | SSH Brute-Force attacks |
2020-05-07 04:57:20 |