City: Karaikal
Region: Union Territory of Puducherry
Country: India
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.139.169.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64023
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;14.139.169.2. IN A
;; AUTHORITY SECTION:
. 575 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020032102 1800 900 604800 86400
;; Query time: 427 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 22 06:32:47 CST 2020
;; MSG SIZE rcvd: 116
Host 2.169.139.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 2.169.139.14.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
142.93.208.92 | attackbotsspam | Dec 26 07:18:41 mail sshd\[2145\]: Invalid user ftpuser from 142.93.208.92 Dec 26 07:18:53 mail sshd\[2149\]: Invalid user git from 142.93.208.92 Dec 26 07:19:06 mail sshd\[2166\]: Invalid user oracle from 142.93.208.92 Dec 26 07:19:33 mail sshd\[2172\]: Invalid user ftpuser from 142.93.208.92 Dec 26 07:19:47 mail sshd\[2175\]: Invalid user oracle from 142.93.208.92 ... |
2019-12-26 22:06:43 |
105.158.74.203 | attackbots | Port 1433 Scan |
2019-12-26 21:43:22 |
45.55.214.64 | attack | Dec 26 09:08:16 ws22vmsma01 sshd[222410]: Failed password for www-data from 45.55.214.64 port 49350 ssh2 ... |
2019-12-26 22:15:19 |
51.255.168.152 | attackbots | 2019-12-25T08:30:06.314123gehlen.rc.princeton.edu sshd[20694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.ip-51-255-168.eu user=r.r 2019-12-25T08:30:07.960965gehlen.rc.princeton.edu sshd[20694]: Failed password for r.r from 51.255.168.152 port 42746 ssh2 2019-12-25T08:32:59.760307gehlen.rc.princeton.edu sshd[21119]: Invalid user rismo from 51.255.168.152 port 57615 2019-12-25T08:32:59.768587gehlen.rc.princeton.edu sshd[21119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.ip-51-255-168.eu 2019-12-25T08:32:59.760307gehlen.rc.princeton.edu sshd[21119]: Invalid user rismo from 51.255.168.152 port 57615 2019-12-25T08:33:02.081962gehlen.rc.princeton.edu sshd[21119]: Failed password for invalid user rismo from 51.255.168.152 port 57615 ssh2 2019-12-25T08:35:54.024070gehlen.rc.princeton.edu sshd[21526]: Invalid user rasilla from 51.255.168.152 port 44251 2019-12-25T08:35:54.032410geh........ ------------------------------ |
2019-12-26 21:45:34 |
103.47.60.37 | attack | Dec 26 14:04:08 dev0-dcde-rnet sshd[8771]: Failed password for games from 103.47.60.37 port 34642 ssh2 Dec 26 14:18:34 dev0-dcde-rnet sshd[8913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.47.60.37 Dec 26 14:18:35 dev0-dcde-rnet sshd[8913]: Failed password for invalid user server from 103.47.60.37 port 35632 ssh2 |
2019-12-26 22:15:07 |
89.142.73.116 | attack | Scanning |
2019-12-26 21:40:23 |
118.143.198.3 | attackspambots | Dec 26 08:57:24 plusreed sshd[27460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.143.198.3 user=root Dec 26 08:57:26 plusreed sshd[27460]: Failed password for root from 118.143.198.3 port 58425 ssh2 ... |
2019-12-26 22:00:08 |
112.162.191.160 | attackspam | Invalid user soltau from 112.162.191.160 port 34366 |
2019-12-26 22:04:59 |
49.212.150.199 | attackbots | 5x Failed Password |
2019-12-26 22:08:45 |
112.42.185.43 | attackspam | Scanning |
2019-12-26 22:08:18 |
84.3.122.229 | attackspam | Brute-force attempt banned |
2019-12-26 22:07:10 |
42.113.104.110 | attackspam | firewall-block, port(s): 23/tcp |
2019-12-26 21:50:47 |
185.104.157.210 | attack | 1577344470 - 12/26/2019 08:14:30 Host: 185.104.157.210/185.104.157.210 Port: 445 TCP Blocked |
2019-12-26 22:04:19 |
5.88.161.197 | attack | SSH Brute Force, server-1 sshd[22148]: Failed password for root from 5.88.161.197 port 48423 ssh2 |
2019-12-26 22:08:59 |
167.99.46.145 | attackbots | Dec 26 12:38:08 lnxweb61 sshd[9670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.46.145 |
2019-12-26 21:53:12 |