City: unknown
Region: unknown
Country: New Zealand
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.74.64.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10637
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.74.64.214. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020201 1800 900 604800 86400
;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 11:01:55 CST 2025
;; MSG SIZE rcvd: 106
214.64.74.121.in-addr.arpa domain name pointer 121-74-64-214.telstraclear.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
214.64.74.121.in-addr.arpa name = 121-74-64-214.telstraclear.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
205.185.124.12 | attackspam | Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-12T17:24:28Z and 2020-06-12T17:31:12Z |
2020-06-13 01:36:04 |
211.154.6.226 | attackbots | firewall-block, port(s): 1433/tcp |
2020-06-13 01:08:21 |
207.180.201.51 | attackspambots | firewall-block, port(s): 443/tcp |
2020-06-13 01:11:54 |
222.186.175.163 | attackbots | Jun 12 13:09:12 NPSTNNYC01T sshd[25039]: Failed password for root from 222.186.175.163 port 20568 ssh2 Jun 12 13:09:16 NPSTNNYC01T sshd[25039]: Failed password for root from 222.186.175.163 port 20568 ssh2 Jun 12 13:09:20 NPSTNNYC01T sshd[25039]: Failed password for root from 222.186.175.163 port 20568 ssh2 Jun 12 13:09:23 NPSTNNYC01T sshd[25039]: Failed password for root from 222.186.175.163 port 20568 ssh2 ... |
2020-06-13 01:09:39 |
113.141.66.255 | attack | Invalid user zs from 113.141.66.255 port 58435 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.141.66.255 Invalid user zs from 113.141.66.255 port 58435 Failed password for invalid user zs from 113.141.66.255 port 58435 ssh2 Invalid user lab from 113.141.66.255 port 42076 |
2020-06-13 01:26:43 |
14.143.107.226 | attack | Jun 12 19:31:18 sip sshd[624521]: Invalid user terraria from 14.143.107.226 port 48341 Jun 12 19:31:20 sip sshd[624521]: Failed password for invalid user terraria from 14.143.107.226 port 48341 ssh2 Jun 12 19:38:43 sip sshd[624574]: Invalid user rg from 14.143.107.226 port 46200 ... |
2020-06-13 01:39:46 |
167.114.98.229 | attack | Jun 12 18:44:34 abendstille sshd\[26674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.229 user=root Jun 12 18:44:36 abendstille sshd\[26674\]: Failed password for root from 167.114.98.229 port 44300 ssh2 Jun 12 18:48:09 abendstille sshd\[29964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.229 user=root Jun 12 18:48:12 abendstille sshd\[29964\]: Failed password for root from 167.114.98.229 port 44952 ssh2 Jun 12 18:51:49 abendstille sshd\[1017\]: Invalid user test_user from 167.114.98.229 Jun 12 18:51:49 abendstille sshd\[1017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.229 ... |
2020-06-13 01:20:35 |
159.203.30.50 | attackspam | firewall-block, port(s): 27847/tcp |
2020-06-13 01:34:53 |
190.128.239.146 | attackbots | 2020-06-12T17:18:56.463876shield sshd\[21111\]: Invalid user mssql from 190.128.239.146 port 37260 2020-06-12T17:18:56.467695shield sshd\[21111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.visual.com.py 2020-06-12T17:18:58.841682shield sshd\[21111\]: Failed password for invalid user mssql from 190.128.239.146 port 37260 ssh2 2020-06-12T17:23:09.291138shield sshd\[22832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.visual.com.py user=root 2020-06-12T17:23:11.064262shield sshd\[22832\]: Failed password for root from 190.128.239.146 port 38506 ssh2 |
2020-06-13 01:24:09 |
124.232.133.205 | attackbots | Jun 12 12:07:56 Tower sshd[3585]: refused connect from 139.155.121.90 (139.155.121.90) Jun 12 12:51:21 Tower sshd[3585]: Connection from 124.232.133.205 port 31010 on 192.168.10.220 port 22 rdomain "" Jun 12 12:51:23 Tower sshd[3585]: Failed password for root from 124.232.133.205 port 31010 ssh2 Jun 12 12:51:24 Tower sshd[3585]: Received disconnect from 124.232.133.205 port 31010:11: Bye Bye [preauth] Jun 12 12:51:24 Tower sshd[3585]: Disconnected from authenticating user root 124.232.133.205 port 31010 [preauth] |
2020-06-13 01:26:20 |
101.89.219.59 | attack | Brute force attempt |
2020-06-13 01:15:30 |
111.229.199.67 | attackspam | 20 attempts against mh-ssh on echoip |
2020-06-13 01:07:33 |
104.248.246.4 | attackbotsspam | Jun 12 18:52:11 lnxweb62 sshd[12550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.246.4 |
2020-06-13 00:54:54 |
185.22.142.197 | attackspam | Jun 12 18:46:31 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\ |
2020-06-13 00:57:34 |
218.248.240.113 | attackspam | 06/12/2020-12:51:50.567266 218.248.240.113 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-06-13 01:31:21 |