City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.243.14.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54974
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;108.243.14.150. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 04:14:58 CST 2025
;; MSG SIZE rcvd: 107
150.14.243.108.in-addr.arpa domain name pointer 108-243-14-150.lightspeed.hstntx.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
150.14.243.108.in-addr.arpa name = 108-243-14-150.lightspeed.hstntx.sbcglobal.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.248.90.77 | attackspam | Jan 10 06:02:21 sxvn sshd[1009429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.90.77 |
2020-01-10 16:57:29 |
| 185.153.196.47 | attack | Jan 10 09:10:15 debian-2gb-nbg1-2 kernel: \[903125.851754\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.153.196.47 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=31313 PROTO=TCP SPT=54841 DPT=3321 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-01-10 16:23:13 |
| 14.162.83.8 | attackbots | 1578631941 - 01/10/2020 05:52:21 Host: 14.162.83.8/14.162.83.8 Port: 445 TCP Blocked |
2020-01-10 17:00:36 |
| 124.158.179.36 | attackbots | 20/1/10@00:36:56: FAIL: Alarm-Network address from=124.158.179.36 20/1/10@00:36:56: FAIL: Alarm-Network address from=124.158.179.36 ... |
2020-01-10 16:33:00 |
| 222.186.169.194 | attackspambots | Jan 10 09:41:34 dedicated sshd[3242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root Jan 10 09:41:36 dedicated sshd[3242]: Failed password for root from 222.186.169.194 port 4902 ssh2 |
2020-01-10 16:44:05 |
| 222.186.175.154 | attack | Jan 10 03:50:46 mail sshd\[28889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154 user=root ... |
2020-01-10 16:53:13 |
| 92.118.37.70 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 95 - port: 3390 proto: TCP cat: Misc Attack |
2020-01-10 16:35:38 |
| 92.253.171.172 | attack | SSH Brute-Forcing (server1) |
2020-01-10 16:48:58 |
| 14.102.2.21 | attackbots | Jan 10 05:53:04 debian-2gb-nbg1-2 kernel: \[891295.383074\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=14.102.2.21 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=30579 DF PROTO=TCP SPT=58017 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 |
2020-01-10 16:32:41 |
| 69.162.98.124 | attackspam | Unauthorized connection attempt detected from IP address 69.162.98.124 to port 445 |
2020-01-10 16:52:09 |
| 195.117.101.79 | attackbots | Jan 9 19:54:18 sachi sshd\[24277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.117.101.79 user=root Jan 9 19:54:19 sachi sshd\[24277\]: Failed password for root from 195.117.101.79 port 54440 ssh2 Jan 9 19:57:37 sachi sshd\[24522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.117.101.79 user=root Jan 9 19:57:39 sachi sshd\[24522\]: Failed password for root from 195.117.101.79 port 52060 ssh2 Jan 9 20:00:55 sachi sshd\[24805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.117.101.79 user=root |
2020-01-10 16:53:41 |
| 123.207.142.31 | attackbots | Jan 10 05:55:35 ip-172-31-62-245 sshd\[30927\]: Invalid user tao from 123.207.142.31\ Jan 10 05:55:37 ip-172-31-62-245 sshd\[30927\]: Failed password for invalid user tao from 123.207.142.31 port 45501 ssh2\ Jan 10 05:59:05 ip-172-31-62-245 sshd\[31009\]: Invalid user oracle from 123.207.142.31\ Jan 10 05:59:07 ip-172-31-62-245 sshd\[31009\]: Failed password for invalid user oracle from 123.207.142.31 port 58498 ssh2\ Jan 10 06:02:29 ip-172-31-62-245 sshd\[31043\]: Failed password for root from 123.207.142.31 port 43262 ssh2\ |
2020-01-10 17:01:25 |
| 2.226.12.12 | attackspambots | Jan 10 05:53:07 grey postfix/smtpd\[821\]: NOQUEUE: reject: RCPT from 2-226-12-12.ip178.fastwebnet.it\[2.226.12.12\]: 554 5.7.1 Service unavailable\; Client host \[2.226.12.12\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?2.226.12.12\; from=\ |
2020-01-10 16:29:51 |
| 122.51.229.98 | attackbotsspam | Jan 9 23:37:08 onepro3 sshd[12070]: Failed password for invalid user admin from 122.51.229.98 port 56100 ssh2 Jan 9 23:49:14 onepro3 sshd[12228]: Failed password for root from 122.51.229.98 port 56212 ssh2 Jan 9 23:53:09 onepro3 sshd[12281]: Failed password for invalid user ajketner from 122.51.229.98 port 55522 ssh2 |
2020-01-10 16:27:52 |
| 129.28.191.55 | attackspambots | 1578631995 - 01/10/2020 05:53:15 Host: 129.28.191.55/129.28.191.55 Port: 22 TCP Blocked |
2020-01-10 16:25:48 |