City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.116.90.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57929
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.116.90.99. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062701 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 03:42:42 CST 2025
;; MSG SIZE rcvd: 105
Host 99.90.116.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 99.90.116.14.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
114.67.95.121 | attack | $f2bV_matches |
2020-09-14 13:13:41 |
86.61.66.59 | attack | $f2bV_matches |
2020-09-14 12:43:50 |
222.186.175.183 | attackbots | Sep 14 06:58:31 nuernberg-4g-01 sshd[30590]: Failed password for root from 222.186.175.183 port 36208 ssh2 Sep 14 06:58:36 nuernberg-4g-01 sshd[30590]: Failed password for root from 222.186.175.183 port 36208 ssh2 Sep 14 06:58:39 nuernberg-4g-01 sshd[30590]: Failed password for root from 222.186.175.183 port 36208 ssh2 Sep 14 06:58:43 nuernberg-4g-01 sshd[30590]: Failed password for root from 222.186.175.183 port 36208 ssh2 |
2020-09-14 12:59:58 |
111.21.255.2 | attack | Sep 13 20:44:46 relay postfix/smtpd\[10142\]: warning: unknown\[111.21.255.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 13 20:45:00 relay postfix/smtpd\[10147\]: warning: unknown\[111.21.255.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 13 20:45:14 relay postfix/smtpd\[10142\]: warning: unknown\[111.21.255.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 13 21:01:22 relay postfix/smtpd\[18323\]: warning: unknown\[111.21.255.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 13 21:01:37 relay postfix/smtpd\[18326\]: warning: unknown\[111.21.255.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-09-14 13:18:04 |
111.229.199.239 | attackspambots | SSH Brute-Forcing (server1) |
2020-09-14 12:52:08 |
119.96.230.241 | attackbotsspam | Sep 13 18:52:34 abendstille sshd\[13969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.230.241 user=root Sep 13 18:52:36 abendstille sshd\[13969\]: Failed password for root from 119.96.230.241 port 44496 ssh2 Sep 13 18:56:02 abendstille sshd\[18169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.230.241 user=root Sep 13 18:56:04 abendstille sshd\[18169\]: Failed password for root from 119.96.230.241 port 33312 ssh2 Sep 13 18:59:18 abendstille sshd\[21185\]: Invalid user carlos from 119.96.230.241 ... |
2020-09-14 12:40:27 |
140.143.9.145 | attack | Sep 14 06:30:38 itv-usvr-02 sshd[3216]: Invalid user catering from 140.143.9.145 port 47416 Sep 14 06:30:38 itv-usvr-02 sshd[3216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.9.145 Sep 14 06:30:38 itv-usvr-02 sshd[3216]: Invalid user catering from 140.143.9.145 port 47416 Sep 14 06:30:41 itv-usvr-02 sshd[3216]: Failed password for invalid user catering from 140.143.9.145 port 47416 ssh2 Sep 14 06:36:04 itv-usvr-02 sshd[3536]: Invalid user perfecto from 140.143.9.145 port 48878 |
2020-09-14 13:11:40 |
27.4.170.82 | attackspam | Port probing on unauthorized port 23 |
2020-09-14 12:36:55 |
49.233.54.98 | attackspam | SSH invalid-user multiple login try |
2020-09-14 12:45:17 |
212.145.192.205 | attackbotsspam | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-09-14 12:53:56 |
106.13.167.3 | attackbots | Time: Mon Sep 14 04:33:12 2020 +0000 IP: 106.13.167.3 (CN/China/-) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Sep 14 04:17:35 ca-48-ede1 sshd[71177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.167.3 user=root Sep 14 04:17:37 ca-48-ede1 sshd[71177]: Failed password for root from 106.13.167.3 port 40202 ssh2 Sep 14 04:25:34 ca-48-ede1 sshd[71400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.167.3 user=root Sep 14 04:25:36 ca-48-ede1 sshd[71400]: Failed password for root from 106.13.167.3 port 35976 ssh2 Sep 14 04:33:08 ca-48-ede1 sshd[71674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.167.3 user=root |
2020-09-14 12:40:57 |
204.17.56.42 | attackspambots | Sep 13 18:58:28 funkybot sshd[31242]: Failed password for root from 204.17.56.42 port 47440 ssh2 Sep 13 18:58:33 funkybot sshd[31242]: Failed password for root from 204.17.56.42 port 47440 ssh2 ... |
2020-09-14 13:16:01 |
115.60.59.14 | attack | $f2bV_matches |
2020-09-14 12:43:29 |
201.219.10.210 | attackbotsspam | Invalid user adminttd from 201.219.10.210 port 52830 |
2020-09-14 13:08:20 |
192.42.116.18 | attackspambots | Sep 14 01:03:43 vps46666688 sshd[26735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.42.116.18 Sep 14 01:03:45 vps46666688 sshd[26735]: Failed password for invalid user admin from 192.42.116.18 port 32948 ssh2 ... |
2020-09-14 13:03:38 |