City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.199.21.191
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59106
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.199.21.191. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 02:36:29 CST 2025
;; MSG SIZE rcvd: 107
191.21.199.138.in-addr.arpa domain name pointer unn-138-199-21-191.datapacket.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
191.21.199.138.in-addr.arpa name = unn-138-199-21-191.datapacket.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 116.74.20.170 | attackspambots | Port probing on unauthorized port 2323 |
2020-09-14 05:03:21 |
| 129.204.129.170 | attackspam | SSH BruteForce Attack |
2020-09-14 05:26:23 |
| 79.0.147.19 | attackspam | Telnet Server BruteForce Attack |
2020-09-14 04:58:37 |
| 180.89.58.27 | attack | prod8 ... |
2020-09-14 04:51:29 |
| 185.220.101.139 | attack | Sep 13 19:36:55 nuernberg-4g-01 sshd[10692]: Failed password for root from 185.220.101.139 port 29390 ssh2 Sep 13 19:36:58 nuernberg-4g-01 sshd[10692]: Failed password for root from 185.220.101.139 port 29390 ssh2 Sep 13 19:37:01 nuernberg-4g-01 sshd[10692]: Failed password for root from 185.220.101.139 port 29390 ssh2 Sep 13 19:37:04 nuernberg-4g-01 sshd[10692]: Failed password for root from 185.220.101.139 port 29390 ssh2 |
2020-09-14 05:25:18 |
| 190.215.112.122 | attackspam | Sep 13 19:42:12 inter-technics sshd[31110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.215.112.122 user=root Sep 13 19:42:13 inter-technics sshd[31110]: Failed password for root from 190.215.112.122 port 38021 ssh2 Sep 13 19:46:57 inter-technics sshd[31388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.215.112.122 user=root Sep 13 19:46:59 inter-technics sshd[31388]: Failed password for root from 190.215.112.122 port 43302 ssh2 Sep 13 19:51:42 inter-technics sshd[31704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.215.112.122 user=root Sep 13 19:51:45 inter-technics sshd[31704]: Failed password for root from 190.215.112.122 port 48583 ssh2 ... |
2020-09-14 05:09:48 |
| 165.22.55.66 | attack | 2020-09-13T20:18:06.675607dmca.cloudsearch.cf sshd[5837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.55.66 user=root 2020-09-13T20:18:07.845607dmca.cloudsearch.cf sshd[5837]: Failed password for root from 165.22.55.66 port 32678 ssh2 2020-09-13T20:21:50.466514dmca.cloudsearch.cf sshd[5947]: Invalid user admins from 165.22.55.66 port 30315 2020-09-13T20:21:50.472163dmca.cloudsearch.cf sshd[5947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.55.66 2020-09-13T20:21:50.466514dmca.cloudsearch.cf sshd[5947]: Invalid user admins from 165.22.55.66 port 30315 2020-09-13T20:21:52.726237dmca.cloudsearch.cf sshd[5947]: Failed password for invalid user admins from 165.22.55.66 port 30315 ssh2 2020-09-13T20:25:38.855986dmca.cloudsearch.cf sshd[6056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.55.66 user=root 2020-09-13T20:25:40.743636dmca.cloudse ... |
2020-09-14 05:10:22 |
| 206.189.132.8 | attackbots | 2020-09-13T16:51:05.746909abusebot-4.cloudsearch.cf sshd[18979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.132.8 user=root 2020-09-13T16:51:07.395639abusebot-4.cloudsearch.cf sshd[18979]: Failed password for root from 206.189.132.8 port 58560 ssh2 2020-09-13T16:56:15.397439abusebot-4.cloudsearch.cf sshd[19088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.132.8 user=root 2020-09-13T16:56:16.935748abusebot-4.cloudsearch.cf sshd[19088]: Failed password for root from 206.189.132.8 port 35880 ssh2 2020-09-13T16:58:28.075487abusebot-4.cloudsearch.cf sshd[19143]: Invalid user ping from 206.189.132.8 port 40348 2020-09-13T16:58:28.081620abusebot-4.cloudsearch.cf sshd[19143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.132.8 2020-09-13T16:58:28.075487abusebot-4.cloudsearch.cf sshd[19143]: Invalid user ping from 206.189.132.8 port 40348 2 ... |
2020-09-14 05:19:05 |
| 189.178.55.34 | attackspambots | Automatic report - Port Scan Attack |
2020-09-14 05:06:13 |
| 106.13.167.94 | attackbotsspam | SSH invalid-user multiple login try |
2020-09-14 05:02:27 |
| 125.16.205.18 | attackspambots | Sep 13 20:01:21 santamaria sshd\[1952\]: Invalid user alec from 125.16.205.18 Sep 13 20:01:21 santamaria sshd\[1952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.16.205.18 Sep 13 20:01:23 santamaria sshd\[1952\]: Failed password for invalid user alec from 125.16.205.18 port 34482 ssh2 ... |
2020-09-14 05:24:45 |
| 103.136.40.90 | attackspambots | 2020-09-14T03:05:22.779966billing sshd[17252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.136.40.90 2020-09-14T03:05:22.776136billing sshd[17252]: Invalid user bot from 103.136.40.90 port 49036 2020-09-14T03:05:25.064082billing sshd[17252]: Failed password for invalid user bot from 103.136.40.90 port 49036 ssh2 ... |
2020-09-14 04:48:48 |
| 94.191.113.77 | attackspambots | Sep 13 13:22:31 NPSTNNYC01T sshd[9846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.113.77 Sep 13 13:22:32 NPSTNNYC01T sshd[9846]: Failed password for invalid user deployer from 94.191.113.77 port 44044 ssh2 Sep 13 13:24:13 NPSTNNYC01T sshd[10045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.113.77 ... |
2020-09-14 05:16:16 |
| 74.120.14.30 | attackbots |
|
2020-09-14 04:59:07 |
| 218.92.0.247 | attack | Failed password for invalid user from 218.92.0.247 port 56984 ssh2 |
2020-09-14 05:09:05 |