City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.162.141.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10020
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;108.162.141.70. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 152 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 05:42:01 CST 2025
;; MSG SIZE rcvd: 107
70.141.162.108.in-addr.arpa domain name pointer 108-162-141-70.cable.teksavvy.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
70.141.162.108.in-addr.arpa name = 108-162-141-70.cable.teksavvy.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
167.250.161.33 | attack | DDOS attack using random ports for ICMP. |
2019-12-03 14:21:05 |
58.246.138.30 | attackspam | Dec 2 19:53:35 kapalua sshd\[7381\]: Invalid user @\#\$%\^\&\*!\(\) from 58.246.138.30 Dec 2 19:53:35 kapalua sshd\[7381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.138.30 Dec 2 19:53:37 kapalua sshd\[7381\]: Failed password for invalid user @\#\$%\^\&\*!\(\) from 58.246.138.30 port 35202 ssh2 Dec 2 20:01:21 kapalua sshd\[8130\]: Invalid user test from 58.246.138.30 Dec 2 20:01:21 kapalua sshd\[8130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.246.138.30 |
2019-12-03 14:15:45 |
111.230.247.104 | attackspambots | Dec 2 19:09:07 web1 sshd\[417\]: Invalid user fure from 111.230.247.104 Dec 2 19:09:07 web1 sshd\[417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.247.104 Dec 2 19:09:10 web1 sshd\[417\]: Failed password for invalid user fure from 111.230.247.104 port 41334 ssh2 Dec 2 19:16:18 web1 sshd\[1347\]: Invalid user jojo from 111.230.247.104 Dec 2 19:16:18 web1 sshd\[1347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.247.104 |
2019-12-03 14:20:13 |
49.88.112.58 | attackspambots | Dec 3 07:57:40 arianus sshd\[2199\]: Unable to negotiate with 49.88.112.58 port 16337: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\] ... |
2019-12-03 14:59:57 |
202.131.152.2 | attackbots | Dec 2 20:42:45 sachi sshd\[14703\]: Invalid user cmongera from 202.131.152.2 Dec 2 20:42:45 sachi sshd\[14703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.152.2 Dec 2 20:42:46 sachi sshd\[14703\]: Failed password for invalid user cmongera from 202.131.152.2 port 38348 ssh2 Dec 2 20:49:17 sachi sshd\[15271\]: Invalid user hung from 202.131.152.2 Dec 2 20:49:17 sachi sshd\[15271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.152.2 |
2019-12-03 15:02:48 |
94.152.193.14 | attackbotsspam | SpamReport |
2019-12-03 14:41:40 |
157.245.164.42 | attack | Port 22 Scan, PTR: None |
2019-12-03 14:55:14 |
129.211.147.91 | attack | 2019-12-03T06:29:54.487295abusebot-8.cloudsearch.cf sshd\[14678\]: Invalid user webadmin from 129.211.147.91 port 59586 |
2019-12-03 14:55:39 |
221.214.218.5 | attack | 2019-12-03T07:20:33.102660struts4.enskede.local sshd\[21573\]: Invalid user home from 221.214.218.5 port 55216 2019-12-03T07:20:33.109378struts4.enskede.local sshd\[21573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.214.218.5 2019-12-03T07:20:36.073413struts4.enskede.local sshd\[21573\]: Failed password for invalid user home from 221.214.218.5 port 55216 ssh2 2019-12-03T07:28:53.520538struts4.enskede.local sshd\[21608\]: Invalid user jahromi from 221.214.218.5 port 39375 2019-12-03T07:28:53.529500struts4.enskede.local sshd\[21608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.214.218.5 ... |
2019-12-03 14:43:11 |
134.228.154.244 | attackspambots | Automatic report - Port Scan Attack |
2019-12-03 14:40:40 |
129.213.100.212 | attack | Dec 3 01:43:40 plusreed sshd[6778]: Invalid user raza from 129.213.100.212 ... |
2019-12-03 14:58:43 |
201.116.17.122 | attackspambots | Unauthorized connection attempt from IP address 201.116.17.122 on Port 445(SMB) |
2019-12-03 14:46:46 |
81.18.66.4 | attackbots | (Dec 3) LEN=52 TTL=115 ID=6694 DF TCP DPT=445 WINDOW=8192 SYN (Dec 3) LEN=52 TTL=115 ID=4999 DF TCP DPT=1433 WINDOW=8192 SYN (Dec 2) LEN=52 TTL=117 ID=19820 DF TCP DPT=1433 WINDOW=8192 SYN (Dec 2) LEN=52 TTL=117 ID=3597 DF TCP DPT=445 WINDOW=8192 SYN (Dec 2) LEN=52 TTL=117 ID=25160 DF TCP DPT=445 WINDOW=8192 SYN (Dec 2) LEN=52 TTL=117 ID=4214 DF TCP DPT=445 WINDOW=8192 SYN (Dec 2) LEN=52 TTL=117 ID=19217 DF TCP DPT=1433 WINDOW=8192 SYN (Dec 2) LEN=52 TTL=117 ID=17526 DF TCP DPT=445 WINDOW=8192 SYN (Dec 2) LEN=52 TTL=115 ID=20826 DF TCP DPT=445 WINDOW=8192 SYN (Dec 2) LEN=52 TTL=117 ID=32029 DF TCP DPT=1433 WINDOW=8192 SYN (Dec 1) LEN=52 TTL=115 ID=20372 DF TCP DPT=445 WINDOW=8192 SYN (Dec 1) LEN=52 TTL=115 ID=20636 DF TCP DPT=1433 WINDOW=8192 SYN (Dec 1) LEN=52 TTL=117 ID=24440 DF TCP DPT=445 WINDOW=8192 SYN (Dec 1) LEN=52 TTL=115 ID=28206 DF TCP DPT=445 WINDOW=8192 SYN (Dec 1) LEN=52 TTL=117 ID=9417 DF TCP DPT=445 WINDOW=8192 ... |
2019-12-03 14:46:01 |
206.189.222.181 | attackspam | 2019-12-03T05:57:00.938256shield sshd\[13614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.222.181 user=root 2019-12-03T05:57:03.266157shield sshd\[13614\]: Failed password for root from 206.189.222.181 port 33332 ssh2 2019-12-03T06:02:50.312919shield sshd\[15141\]: Invalid user tadao from 206.189.222.181 port 43436 2019-12-03T06:02:50.317350shield sshd\[15141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.222.181 2019-12-03T06:02:52.363695shield sshd\[15141\]: Failed password for invalid user tadao from 206.189.222.181 port 43436 ssh2 |
2019-12-03 14:19:26 |
121.66.224.90 | attackbots | Dec 2 20:23:06 auw2 sshd\[9814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.224.90 user=root Dec 2 20:23:08 auw2 sshd\[9814\]: Failed password for root from 121.66.224.90 port 52678 ssh2 Dec 2 20:29:59 auw2 sshd\[10451\]: Invalid user from 121.66.224.90 Dec 2 20:29:59 auw2 sshd\[10451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.224.90 Dec 2 20:30:02 auw2 sshd\[10451\]: Failed password for invalid user from 121.66.224.90 port 35010 ssh2 |
2019-12-03 14:44:40 |