City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.53.145.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43368
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;116.53.145.214. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062700 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 27 20:34:47 CST 2025
;; MSG SIZE rcvd: 107
b'Host 214.145.53.116.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 116.53.145.214.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
89.248.167.131 | attack | Honeypot hit. |
2019-12-07 22:10:33 |
49.234.43.173 | attackbotsspam | Tried sshing with brute force. |
2019-12-07 21:44:20 |
178.149.114.79 | attackbotsspam | ssh failed login |
2019-12-07 22:12:48 |
140.82.23.73 | attack | Dec 7 07:23:12 lnxmail61 postfix/smtps/smtpd[4396]: lost connection after CONNECT from unknown[140.82.23.73] Dec 7 07:23:22 lnxmail61 postfix/smtps/smtpd[4396]: lost connection after CONNECT from unknown[140.82.23.73] Dec 7 07:23:33 lnxmail61 postfix/smtps/smtpd[4396]: lost connection after CONNECT from unknown[140.82.23.73] Dec 7 07:23:44 lnxmail61 postfix/smtps/smtpd[4396]: lost connection after CONNECT from unknown[140.82.23.73] Dec 7 07:23:54 lnxmail61 postfix/smtps/smtpd[4396]: lost connection after CONNECT from unknown[140.82.23.73] |
2019-12-07 22:24:28 |
217.182.70.125 | attackbots | 2019-12-07T11:03:50.498454abusebot-8.cloudsearch.cf sshd\[25262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.ip-217-182-70.eu user=root |
2019-12-07 21:53:56 |
165.22.112.87 | attackbotsspam | $f2bV_matches |
2019-12-07 21:53:31 |
190.143.142.162 | attackspambots | detected by Fail2Ban |
2019-12-07 22:24:57 |
40.77.167.59 | attackspambots | Automatic report - Banned IP Access |
2019-12-07 22:20:08 |
122.52.227.25 | attackbotsspam | UTC: 2019-12-06 port: 26/tcp |
2019-12-07 22:20:57 |
37.49.225.166 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-07 22:24:40 |
186.159.112.226 | attackspam | proto=tcp . spt=51043 . dpt=25 . (Found on Dark List de Dec 07) (281) |
2019-12-07 22:04:57 |
113.53.213.168 | attack | UTC: 2019-12-06 port: 23/tcp |
2019-12-07 21:52:09 |
119.27.189.46 | attackbotsspam | (sshd) Failed SSH login from 119.27.189.46 (-): 5 in the last 3600 secs |
2019-12-07 22:19:41 |
181.171.181.50 | attack | 2019-12-07T13:34:28.438181host3.slimhost.com.ua sshd[2834338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.171.181.50 user=root 2019-12-07T13:34:30.208969host3.slimhost.com.ua sshd[2834338]: Failed password for root from 181.171.181.50 port 44588 ssh2 2019-12-07T13:43:31.671976host3.slimhost.com.ua sshd[2837687]: Invalid user lucas from 181.171.181.50 port 44562 2019-12-07T13:43:31.676710host3.slimhost.com.ua sshd[2837687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.171.181.50 2019-12-07T13:43:31.671976host3.slimhost.com.ua sshd[2837687]: Invalid user lucas from 181.171.181.50 port 44562 2019-12-07T13:43:34.325498host3.slimhost.com.ua sshd[2837687]: Failed password for invalid user lucas from 181.171.181.50 port 44562 ssh2 2019-12-07T13:50:45.131851host3.slimhost.com.ua sshd[2840804]: Invalid user admin from 181.171.181.50 port 54936 2019-12-07T13:50:45.136952host3.slimhost.com.ua sshd[284 ... |
2019-12-07 22:09:39 |
51.89.166.45 | attackbotsspam | Dec 7 09:26:40 ns382633 sshd\[27768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.166.45 user=root Dec 7 09:26:42 ns382633 sshd\[27768\]: Failed password for root from 51.89.166.45 port 53100 ssh2 Dec 7 09:33:51 ns382633 sshd\[28856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.166.45 user=root Dec 7 09:33:53 ns382633 sshd\[28856\]: Failed password for root from 51.89.166.45 port 34864 ssh2 Dec 7 09:38:55 ns382633 sshd\[29638\]: Invalid user films from 51.89.166.45 port 44330 Dec 7 09:38:55 ns382633 sshd\[29638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.166.45 |
2019-12-07 21:50:30 |