City: Ypsilanti
Region: Michigan
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.214.12.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13346
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.214.12.249. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 08:04:12 CST 2025
;; MSG SIZE rcvd: 107
249.12.214.141.in-addr.arpa domain name pointer host-249.subnet-12.med.umich.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
249.12.214.141.in-addr.arpa name = host-249.subnet-12.med.umich.edu.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 46.161.158.45 | attack | Unauthorized connection attempt detected from IP address 46.161.158.45 to port 445 |
2019-12-09 01:27:07 |
| 137.74.26.179 | attackbotsspam | 2019-12-08T17:04:16.530284abusebot-4.cloudsearch.cf sshd\[16419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.26.179 user=root |
2019-12-09 01:24:26 |
| 185.36.81.238 | attackspambots | 2019-12-08T16:06:48.697803MailD postfix/smtpd[21622]: warning: unknown[185.36.81.238]: SASL LOGIN authentication failed: authentication failure 2019-12-08T17:02:31.004706MailD postfix/smtpd[26213]: warning: unknown[185.36.81.238]: SASL LOGIN authentication failed: authentication failure 2019-12-08T17:59:40.066011MailD postfix/smtpd[29965]: warning: unknown[185.36.81.238]: SASL LOGIN authentication failed: authentication failure |
2019-12-09 01:01:13 |
| 194.182.86.133 | attackbotsspam | Dec 8 17:02:40 localhost sshd\[39690\]: Invalid user blackshaw from 194.182.86.133 port 48082 Dec 8 17:02:40 localhost sshd\[39690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.86.133 Dec 8 17:02:42 localhost sshd\[39690\]: Failed password for invalid user blackshaw from 194.182.86.133 port 48082 ssh2 Dec 8 17:08:33 localhost sshd\[39892\]: Invalid user tomcat from 194.182.86.133 port 56780 Dec 8 17:08:33 localhost sshd\[39892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.86.133 ... |
2019-12-09 01:31:30 |
| 37.139.24.190 | attackspam | Dec 8 19:05:47 server sshd\[20212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.24.190 user=root Dec 8 19:05:50 server sshd\[20212\]: Failed password for root from 37.139.24.190 port 48818 ssh2 Dec 8 19:12:24 server sshd\[21863\]: Invalid user pcap from 37.139.24.190 Dec 8 19:12:24 server sshd\[21863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.24.190 Dec 8 19:12:26 server sshd\[21863\]: Failed password for invalid user pcap from 37.139.24.190 port 60234 ssh2 ... |
2019-12-09 01:05:34 |
| 62.234.156.66 | attackspambots | Dec 6 23:06:09 mail sshd[1973]: Failed password for amavis from 62.234.156.66 port 48130 ssh2 Dec 6 23:13:16 mail sshd[3704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.156.66 Dec 6 23:13:18 mail sshd[3704]: Failed password for invalid user guest from 62.234.156.66 port 45928 ssh2 |
2019-12-09 01:30:08 |
| 39.117.139.244 | attackbotsspam | Dec 8 22:01:24 areeb-Workstation sshd[17530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.117.139.244 Dec 8 22:01:26 areeb-Workstation sshd[17530]: Failed password for invalid user cifersky from 39.117.139.244 port 40980 ssh2 ... |
2019-12-09 01:02:36 |
| 222.186.173.154 | attack | Dec 8 18:12:15 vps691689 sshd[6703]: Failed password for root from 222.186.173.154 port 29448 ssh2 Dec 8 18:12:31 vps691689 sshd[6703]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 29448 ssh2 [preauth] ... |
2019-12-09 01:15:37 |
| 185.36.81.94 | attack | 2019-12-08 dovecot_login authenticator failed for \(User\) \[185.36.81.94\]: 535 Incorrect authentication data \(set_id=root1\) 2019-12-08 dovecot_login authenticator failed for \(User\) \[185.36.81.94\]: 535 Incorrect authentication data \(set_id=root1\) 2019-12-08 dovecot_login authenticator failed for \(User\) \[185.36.81.94\]: 535 Incorrect authentication data \(set_id=root1\) |
2019-12-09 00:58:22 |
| 200.12.130.236 | attack | Unauthorized connection attempt detected from IP address 200.12.130.236 to port 445 |
2019-12-09 01:11:47 |
| 180.250.115.121 | attackbotsspam | Dec 8 22:12:45 itv-usvr-02 sshd[17995]: Invalid user malanie from 180.250.115.121 port 34909 Dec 8 22:12:45 itv-usvr-02 sshd[17995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.115.121 Dec 8 22:12:45 itv-usvr-02 sshd[17995]: Invalid user malanie from 180.250.115.121 port 34909 Dec 8 22:12:47 itv-usvr-02 sshd[17995]: Failed password for invalid user malanie from 180.250.115.121 port 34909 ssh2 Dec 8 22:21:41 itv-usvr-02 sshd[18027]: Invalid user test from 180.250.115.121 port 49007 |
2019-12-09 01:19:57 |
| 203.218.212.174 | attackbots | Fail2Ban Ban Triggered |
2019-12-09 01:11:15 |
| 176.31.217.184 | attack | 2019-12-03 15:07:16,528 fail2ban.actions \[14488\]: NOTICE \[sshd\] Ban 176.31.217.184 2019-12-03 15:38:06,630 fail2ban.actions \[14488\]: NOTICE \[sshd\] Ban 176.31.217.184 2019-12-03 16:16:22,532 fail2ban.actions \[14488\]: NOTICE \[sshd\] Ban 176.31.217.184 2019-12-03 16:48:29,575 fail2ban.actions \[14488\]: NOTICE \[sshd\] Ban 176.31.217.184 2019-12-03 17:20:28,855 fail2ban.actions \[14488\]: NOTICE \[sshd\] Ban 176.31.217.184 ... |
2019-12-09 01:09:08 |
| 122.51.116.169 | attack | Dec 8 07:07:01 server sshd\[8531\]: Failed password for mail from 122.51.116.169 port 24047 ssh2 Dec 8 19:25:26 server sshd\[25793\]: Invalid user michael from 122.51.116.169 Dec 8 19:25:26 server sshd\[25793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.116.169 Dec 8 19:25:28 server sshd\[25793\]: Failed password for invalid user michael from 122.51.116.169 port 57062 ssh2 Dec 8 19:45:04 server sshd\[30893\]: Invalid user ezrati from 122.51.116.169 Dec 8 19:45:04 server sshd\[30893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.116.169 ... |
2019-12-09 01:07:02 |
| 81.91.138.76 | attackspam | Fail2Ban Ban Triggered |
2019-12-09 01:23:01 |