City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.116.20.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30419
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.116.20.229. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 22:00:15 CST 2025
;; MSG SIZE rcvd: 107
b'Host 229.20.116.141.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 141.116.20.229.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 198.108.67.49 | attack | 12/28/2019-11:07:25.128864 198.108.67.49 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-12-29 00:23:06 |
| 202.188.101.106 | attackbots | Dec 28 16:29:36 MK-Soft-Root1 sshd[19929]: Failed password for root from 202.188.101.106 port 55147 ssh2 ... |
2019-12-29 00:25:24 |
| 84.33.124.223 | attackbots | Unauthorized connection attempt detected from IP address 84.33.124.223 to port 85 |
2019-12-29 00:48:57 |
| 94.65.77.253 | attack | TCP Port Scanning |
2019-12-29 00:33:18 |
| 143.176.195.243 | attackspam | Dec 28 17:17:59 vps647732 sshd[348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.176.195.243 Dec 28 17:18:01 vps647732 sshd[348]: Failed password for invalid user www from 143.176.195.243 port 51886 ssh2 ... |
2019-12-29 00:19:09 |
| 85.238.104.97 | attackbotsspam | Dec 28 17:22:39 lukav-desktop sshd\[5255\]: Invalid user m0okn9ijb8uh from 85.238.104.97 Dec 28 17:22:39 lukav-desktop sshd\[5255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.238.104.97 Dec 28 17:22:41 lukav-desktop sshd\[5255\]: Failed password for invalid user m0okn9ijb8uh from 85.238.104.97 port 51610 ssh2 Dec 28 17:26:08 lukav-desktop sshd\[32085\]: Invalid user admin14868 from 85.238.104.97 Dec 28 17:26:08 lukav-desktop sshd\[32085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.238.104.97 |
2019-12-29 00:33:53 |
| 5.200.194.169 | attackspambots | 1577543291 - 12/28/2019 15:28:11 Host: 5.200.194.169/5.200.194.169 Port: 445 TCP Blocked |
2019-12-29 00:36:39 |
| 193.56.28.158 | attackbotsspam | Unauthorized connection attempt detected from IP address 193.56.28.158 to port 1080 |
2019-12-29 00:56:54 |
| 92.112.14.119 | attackspam | Unauthorized connection attempt detected from IP address 92.112.14.119 to port 23 |
2019-12-29 00:48:37 |
| 46.219.3.139 | attackspambots | Dec 28 05:59:25 server sshd\[799\]: Failed password for invalid user fung from 46.219.3.139 port 41140 ssh2 Dec 28 17:20:42 server sshd\[9042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=relay.doris-adv.com user=root Dec 28 17:20:45 server sshd\[9042\]: Failed password for root from 46.219.3.139 port 43796 ssh2 Dec 28 17:28:29 server sshd\[10358\]: Invalid user wwwrun from 46.219.3.139 Dec 28 17:28:29 server sshd\[10358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=relay.doris-adv.com ... |
2019-12-29 00:24:11 |
| 196.52.43.99 | attackbotsspam | Unauthorized connection attempt detected from IP address 196.52.43.99 to port 990 |
2019-12-29 00:42:08 |
| 201.144.206.244 | attackbotsspam | Unauthorized connection attempt detected from IP address 201.144.206.244 to port 1433 |
2019-12-29 00:53:23 |
| 196.52.43.91 | attackbotsspam | Unauthorized connection attempt detected from IP address 196.52.43.91 to port 8888 |
2019-12-29 00:55:49 |
| 46.225.242.179 | attackbots | Autoban 46.225.242.179 AUTH/CONNECT |
2019-12-29 00:21:09 |
| 222.186.173.180 | attackspam | Dec 28 17:34:55 markkoudstaal sshd[20151]: Failed password for root from 222.186.173.180 port 36876 ssh2 Dec 28 17:34:59 markkoudstaal sshd[20151]: Failed password for root from 222.186.173.180 port 36876 ssh2 Dec 28 17:35:02 markkoudstaal sshd[20151]: Failed password for root from 222.186.173.180 port 36876 ssh2 Dec 28 17:35:08 markkoudstaal sshd[20151]: error: maximum authentication attempts exceeded for root from 222.186.173.180 port 36876 ssh2 [preauth] |
2019-12-29 00:37:27 |