City: unknown
Region: unknown
Country: Korea (the Republic of)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.93.252.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64391
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.93.252.190. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:14:08 CST 2025
;; MSG SIZE rcvd: 106
Host 190.252.93.14.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 190.252.93.14.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 122.228.19.80 | attackspam | Unauthorized connection attempt detected from IP address 122.228.19.80 to port 500 [T] |
2020-04-25 20:34:03 |
| 122.152.210.156 | attackspambots | Apr 25 14:13:25 dev0-dcde-rnet sshd[22676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.210.156 Apr 25 14:13:27 dev0-dcde-rnet sshd[22676]: Failed password for invalid user barbel from 122.152.210.156 port 36006 ssh2 Apr 25 14:15:35 dev0-dcde-rnet sshd[22689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.210.156 |
2020-04-25 20:38:10 |
| 80.70.22.209 | attackspambots | Email rejected due to spam filtering |
2020-04-25 20:34:58 |
| 181.49.116.50 | attackbotsspam | Unauthorized connection attempt from IP address 181.49.116.50 on Port 445(SMB) |
2020-04-25 20:33:29 |
| 103.95.41.9 | attackbotsspam | 5x Failed Password |
2020-04-25 20:10:15 |
| 222.186.180.142 | attackbotsspam | Apr 25 14:39:55 vpn01 sshd[18728]: Failed password for root from 222.186.180.142 port 19528 ssh2 Apr 25 14:39:58 vpn01 sshd[18728]: Failed password for root from 222.186.180.142 port 19528 ssh2 ... |
2020-04-25 20:42:29 |
| 119.8.7.11 | attackbots | 2020-04-25T12:11:11.180068shield sshd\[15970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.8.7.11 user=ftp 2020-04-25T12:11:12.632441shield sshd\[15970\]: Failed password for ftp from 119.8.7.11 port 35822 ssh2 2020-04-25T12:15:42.976128shield sshd\[17073\]: Invalid user ubuntu from 119.8.7.11 port 50130 2020-04-25T12:15:42.980857shield sshd\[17073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.8.7.11 2020-04-25T12:15:44.965266shield sshd\[17073\]: Failed password for invalid user ubuntu from 119.8.7.11 port 50130 ssh2 |
2020-04-25 20:24:08 |
| 201.103.207.1 | attack | probes 17 times on the port 8080 |
2020-04-25 20:45:05 |
| 24.222.126.135 | attackbotsspam | Unauthorized connection attempt detected from IP address 24.222.126.135 to port 23 |
2020-04-25 20:10:48 |
| 83.233.193.39 | attack | Honeypot attack, port: 5555, PTR: 83-233-193-39.cust.bredband2.com. |
2020-04-25 20:34:40 |
| 185.202.2.24 | attackspam | RDP brute forcing (r) |
2020-04-25 20:18:41 |
| 117.44.16.100 | attackbotsspam | The IP 117.44.16.100 has just been banned by Fail2Ban after 5 attempts against dovecot. |
2020-04-25 20:10:00 |
| 178.48.14.253 | attackspam | Port probing on unauthorized port 23 |
2020-04-25 20:13:34 |
| 162.243.128.208 | attackspambots | Unauthorized connection attempt detected from IP address 162.243.128.208 to port 9160 [T] |
2020-04-25 20:14:13 |
| 146.185.130.101 | attack | Apr 25 14:21:06 plex sshd[10161]: Invalid user openvpn_as from 146.185.130.101 port 44910 Apr 25 14:21:06 plex sshd[10161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.130.101 Apr 25 14:21:06 plex sshd[10161]: Invalid user openvpn_as from 146.185.130.101 port 44910 Apr 25 14:21:09 plex sshd[10161]: Failed password for invalid user openvpn_as from 146.185.130.101 port 44910 ssh2 Apr 25 14:24:46 plex sshd[10259]: Invalid user oracle from 146.185.130.101 port 57632 |
2020-04-25 20:36:24 |