City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.14.201.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36270
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.14.201.69. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 18:54:58 CST 2025
;; MSG SIZE rcvd: 106
Host 69.201.14.138.in-addr.arpa not found: 2(SERVFAIL)
server can't find 138.14.201.69.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 201.138.65.241 | attackspambots | Icarus honeypot on github |
2020-10-08 21:46:50 |
| 185.176.27.94 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 3397 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-08 21:23:54 |
| 61.145.178.134 | attackbotsspam | 2020-10-08T06:45:43.032934billing sshd[3821]: Failed password for root from 61.145.178.134 port 42210 ssh2 2020-10-08T06:48:35.206546billing sshd[10319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.145.178.134 user=root 2020-10-08T06:48:36.949028billing sshd[10319]: Failed password for root from 61.145.178.134 port 32772 ssh2 ... |
2020-10-08 21:46:05 |
| 213.171.43.155 | attack | Unauthorized connection attempt from IP address 213.171.43.155 on Port 445(SMB) |
2020-10-08 21:46:36 |
| 111.121.78.79 | attack | Oct 8 11:14:37 mail sshd[9121]: Invalid user dnsadrc from 111.121.78.79 Oct 8 11:14:37 mail sshd[9121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.121.78.79 Oct 8 11:14:39 mail sshd[9121]: Failed password for invalid user dnsadrc from 111.121.78.79 port 9068 ssh2 Oct 8 11:14:39 mail sshd[9121]: Received disconnect from 111.121.78.79 port 9068:11: Normal Shutdown, Thank you for playing [preauth] Oct 8 11:14:39 mail sshd[9121]: Disconnected from 111.121.78.79 port 9068 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=111.121.78.79 |
2020-10-08 21:31:43 |
| 142.93.254.122 | attack | Oct 8 14:44:18 ip106 sshd[12290]: Failed password for root from 142.93.254.122 port 52914 ssh2 ... |
2020-10-08 21:17:36 |
| 81.82.251.244 | attackspam | Oct 5 04:02:22 server3 sshd[7612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.82.251.244 user=r.r Oct 5 04:02:24 server3 sshd[7612]: Failed password for r.r from 81.82.251.244 port 59191 ssh2 Oct 5 04:02:24 server3 sshd[7612]: Received disconnect from 81.82.251.244 port 59191:11: Bye Bye [preauth] Oct 5 04:02:24 server3 sshd[7612]: Disconnected from 81.82.251.244 port 59191 [preauth] Oct 5 04:12:49 server3 sshd[8034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.82.251.244 user=r.r Oct 5 04:12:51 server3 sshd[8034]: Failed password for r.r from 81.82.251.244 port 41946 ssh2 Oct 5 04:12:51 server3 sshd[8034]: Received disconnect from 81.82.251.244 port 41946:11: Bye Bye [preauth] Oct 5 04:12:51 server3 sshd[8034]: Disconnected from 81.82.251.244 port 41946 [preauth] Oct 5 04:16:28 server3 sshd[8127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t........ ------------------------------- |
2020-10-08 21:16:53 |
| 106.13.175.126 | attackbots | Oct 8 12:42:00 vps sshd[17250]: Failed password for root from 106.13.175.126 port 36050 ssh2 Oct 8 12:52:08 vps sshd[17882]: Failed password for root from 106.13.175.126 port 53762 ssh2 ... |
2020-10-08 21:36:59 |
| 3.229.134.239 | attack | [Sat Oct 03 19:15:54 2020] - Syn Flood From IP: 3.229.134.239 Port: 58089 |
2020-10-08 21:13:25 |
| 183.82.111.184 | attackbotsspam | Port Scan ... |
2020-10-08 21:12:18 |
| 34.93.0.165 | attackbots | Oct 8 14:13:22 server sshd[57201]: Failed password for root from 34.93.0.165 port 11388 ssh2 Oct 8 14:17:30 server sshd[58196]: Failed password for root from 34.93.0.165 port 10862 ssh2 Oct 8 14:21:41 server sshd[59212]: Failed password for root from 34.93.0.165 port 10328 ssh2 |
2020-10-08 21:34:31 |
| 165.227.176.208 | attackspam | Oct 8 13:35:10 server sshd[9787]: User sync from 165.227.176.208 not allowed because not listed in AllowUsers Oct 8 13:35:12 server sshd[9787]: Failed password for invalid user sync from 165.227.176.208 port 48278 ssh2 Oct 8 13:38:44 server sshd[11707]: Failed password for invalid user chris from 165.227.176.208 port 46650 ssh2 |
2020-10-08 21:32:50 |
| 156.251.125.148 | attackspam | $f2bV_matches |
2020-10-08 21:48:17 |
| 206.81.12.141 | attackbots | 2020-10-08 05:38:17.677701-0500 localhost sshd[53550]: Failed password for root from 206.81.12.141 port 46200 ssh2 |
2020-10-08 21:50:13 |
| 49.75.54.214 | attackspam | 5x Failed Password |
2020-10-08 21:49:50 |