City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.1.200.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.1.200.14. IN A
;; AUTHORITY SECTION:
. 232 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020100800 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 08 15:49:02 CST 2020
;; MSG SIZE rcvd: 116
Host 14.200.1.142.in-addr.arpa not found: 2(SERVFAIL)
Server: 183.60.82.98
Address: 183.60.82.98#53
Non-authoritative answer:
*** Can't find 14.200.1.142.in-addr.arpa.: No answer
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
122.51.165.18 | attackbotsspam | Apr 8 00:51:38 NPSTNNYC01T sshd[18296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.165.18 Apr 8 00:51:40 NPSTNNYC01T sshd[18296]: Failed password for invalid user belgica from 122.51.165.18 port 57328 ssh2 Apr 8 00:56:06 NPSTNNYC01T sshd[18536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.165.18 ... |
2020-04-08 13:09:06 |
51.83.254.34 | attackspambots | $f2bV_matches |
2020-04-08 14:02:59 |
193.224.52.213 | attack | DATE:2020-04-08 05:58:54, IP:193.224.52.213, PORT:ssh SSH brute force auth (docker-dc) |
2020-04-08 13:46:05 |
45.79.20.188 | attack | Apr 8 05:59:32 ArkNodeAT sshd\[12935\]: Invalid user cristina from 45.79.20.188 Apr 8 05:59:32 ArkNodeAT sshd\[12935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.79.20.188 Apr 8 05:59:34 ArkNodeAT sshd\[12935\]: Failed password for invalid user cristina from 45.79.20.188 port 57700 ssh2 |
2020-04-08 13:09:26 |
49.76.148.94 | attackspambots | ssh intrusion attempt |
2020-04-08 13:49:16 |
103.133.108.48 | attackspambots | Postfix SMTP rejection |
2020-04-08 13:12:08 |
122.51.71.156 | attackbots | Apr 7 22:30:05 mockhub sshd[19263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.71.156 Apr 7 22:30:07 mockhub sshd[19263]: Failed password for invalid user popa3d from 122.51.71.156 port 38042 ssh2 ... |
2020-04-08 14:00:27 |
134.122.129.4 | attack | Apr 8 05:01:46 scw-6657dc sshd[23804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.129.4 Apr 8 05:01:46 scw-6657dc sshd[23804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.129.4 Apr 8 05:01:49 scw-6657dc sshd[23804]: Failed password for invalid user webcam from 134.122.129.4 port 35652 ssh2 ... |
2020-04-08 13:16:16 |
121.201.95.62 | attackbotsspam | 2020-04-08T05:23:35.817599shield sshd\[21046\]: Invalid user admin from 121.201.95.62 port 54636 2020-04-08T05:23:35.822358shield sshd\[21046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.201.95.62 2020-04-08T05:23:37.894614shield sshd\[21046\]: Failed password for invalid user admin from 121.201.95.62 port 54636 ssh2 2020-04-08T05:27:12.599200shield sshd\[21616\]: Invalid user vps from 121.201.95.62 port 40844 2020-04-08T05:27:12.602421shield sshd\[21616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.201.95.62 |
2020-04-08 13:51:57 |
180.76.249.74 | attack | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-04-08 13:23:56 |
45.143.223.91 | attackspam | Automatically reported by fail2ban report script (powermetal_old) |
2020-04-08 13:55:15 |
106.13.41.93 | attackspambots | Apr 8 06:11:24 srv-ubuntu-dev3 sshd[37582]: Invalid user test from 106.13.41.93 Apr 8 06:11:24 srv-ubuntu-dev3 sshd[37582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.41.93 Apr 8 06:11:24 srv-ubuntu-dev3 sshd[37582]: Invalid user test from 106.13.41.93 Apr 8 06:11:27 srv-ubuntu-dev3 sshd[37582]: Failed password for invalid user test from 106.13.41.93 port 52432 ssh2 Apr 8 06:14:32 srv-ubuntu-dev3 sshd[38069]: Invalid user deploy from 106.13.41.93 Apr 8 06:14:32 srv-ubuntu-dev3 sshd[38069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.41.93 Apr 8 06:14:32 srv-ubuntu-dev3 sshd[38069]: Invalid user deploy from 106.13.41.93 Apr 8 06:14:34 srv-ubuntu-dev3 sshd[38069]: Failed password for invalid user deploy from 106.13.41.93 port 38506 ssh2 Apr 8 06:17:30 srv-ubuntu-dev3 sshd[38706]: Invalid user atlas from 106.13.41.93 ... |
2020-04-08 13:42:52 |
111.67.193.215 | attack | $f2bV_matches |
2020-04-08 13:54:36 |
89.248.168.217 | attack | Port 22547 scan denied |
2020-04-08 13:48:44 |
111.20.68.38 | attackbots | $f2bV_matches |
2020-04-08 14:03:52 |