City: unknown
Region: unknown
Country: India
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.97.164.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12835
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.97.164.122. IN A
;; AUTHORITY SECTION:
. 290 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:09:27 CST 2022
;; MSG SIZE rcvd: 106
122.164.97.14.in-addr.arpa domain name pointer static-122.164.97.14-tataidc.co.in.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
122.164.97.14.in-addr.arpa name = static-122.164.97.14-tataidc.co.in.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
113.179.132.36 | attackspambots | Unauthorized connection attempt from IP address 113.179.132.36 on Port 445(SMB) |
2020-06-08 04:20:56 |
198.108.67.28 | attack | Unauthorized connection attempt from IP address 198.108.67.28 on Port 3306(MYSQL) |
2020-06-08 04:27:32 |
49.234.76.196 | attack | Jun 7 04:52:16 pixelmemory sshd[1480736]: Failed password for root from 49.234.76.196 port 34232 ssh2 Jun 7 04:56:40 pixelmemory sshd[1485990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.76.196 user=root Jun 7 04:56:42 pixelmemory sshd[1485990]: Failed password for root from 49.234.76.196 port 55380 ssh2 Jun 7 05:01:09 pixelmemory sshd[1491245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.76.196 user=root Jun 7 05:01:11 pixelmemory sshd[1491245]: Failed password for root from 49.234.76.196 port 48292 ssh2 ... |
2020-06-08 04:14:37 |
119.96.189.177 | attackspambots | Jun 7 22:25:18 eventyay sshd[1573]: Failed password for root from 119.96.189.177 port 44888 ssh2 Jun 7 22:27:10 eventyay sshd[1650]: Failed password for root from 119.96.189.177 port 36274 ssh2 ... |
2020-06-08 04:34:40 |
104.248.121.67 | attackbotsspam | Jun 7 11:01:21 propaganda sshd[62232]: Connection from 104.248.121.67 port 51819 on 10.0.0.160 port 22 rdomain "" Jun 7 11:01:21 propaganda sshd[62232]: Connection closed by 104.248.121.67 port 51819 [preauth] |
2020-06-08 04:25:44 |
165.22.35.107 | attackspambots | Jun 7 22:03:04 piServer sshd[22992]: Failed password for root from 165.22.35.107 port 34122 ssh2 Jun 7 22:06:17 piServer sshd[23453]: Failed password for root from 165.22.35.107 port 37574 ssh2 ... |
2020-06-08 04:19:41 |
49.51.90.60 | attackspam | Jun 7 21:32:55 sip sshd[576789]: Failed password for root from 49.51.90.60 port 33330 ssh2 Jun 7 21:37:14 sip sshd[576811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.90.60 user=root Jun 7 21:37:15 sip sshd[576811]: Failed password for root from 49.51.90.60 port 37228 ssh2 ... |
2020-06-08 04:15:07 |
128.199.197.161 | attackbotsspam | Jun 7 14:01:28 lnxmysql61 sshd[18424]: Failed password for root from 128.199.197.161 port 36944 ssh2 Jun 7 14:01:28 lnxmysql61 sshd[18424]: Failed password for root from 128.199.197.161 port 36944 ssh2 |
2020-06-08 04:00:57 |
62.148.142.202 | attack | Jun 7 17:59:45 prod4 sshd\[8345\]: Failed password for root from 62.148.142.202 port 38328 ssh2 Jun 7 18:03:18 prod4 sshd\[10313\]: Failed password for root from 62.148.142.202 port 40186 ssh2 Jun 7 18:06:48 prod4 sshd\[11813\]: Failed password for root from 62.148.142.202 port 42040 ssh2 ... |
2020-06-08 04:02:37 |
68.183.178.162 | attackspam | Jun 7 13:54:09 inter-technics sshd[32007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162 user=root Jun 7 13:54:12 inter-technics sshd[32007]: Failed password for root from 68.183.178.162 port 35144 ssh2 Jun 7 13:57:24 inter-technics sshd[32275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162 user=root Jun 7 13:57:26 inter-technics sshd[32275]: Failed password for root from 68.183.178.162 port 58342 ssh2 Jun 7 14:00:44 inter-technics sshd[32485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162 user=root Jun 7 14:00:47 inter-technics sshd[32485]: Failed password for root from 68.183.178.162 port 53304 ssh2 ... |
2020-06-08 04:13:22 |
140.206.223.43 | attackbotsspam | 06/07/2020-15:53:41.038518 140.206.223.43 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-06-08 04:01:56 |
187.120.0.22 | attackspam | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-06-08 04:17:58 |
118.97.133.242 | attack | Unauthorized connection attempt from IP address 118.97.133.242 on Port 445(SMB) |
2020-06-08 04:19:00 |
222.186.42.155 | attackspam | Jun 7 22:30:46 vps sshd[49730]: Failed password for root from 222.186.42.155 port 16376 ssh2 Jun 7 22:30:48 vps sshd[49730]: Failed password for root from 222.186.42.155 port 16376 ssh2 Jun 7 22:30:49 vps sshd[50205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155 user=root Jun 7 22:30:52 vps sshd[50205]: Failed password for root from 222.186.42.155 port 47059 ssh2 Jun 7 22:30:53 vps sshd[50205]: Failed password for root from 222.186.42.155 port 47059 ssh2 ... |
2020-06-08 04:33:35 |
171.224.177.232 | attack | Unauthorized connection attempt from IP address 171.224.177.232 on Port 445(SMB) |
2020-06-08 04:12:02 |