Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: OVH Hosting Inc.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbotsspam
2020-06-21T21:15:03.211716shield sshd\[26059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net  user=root
2020-06-21T21:15:04.405457shield sshd\[26059\]: Failed password for root from 142.44.160.214 port 33167 ssh2
2020-06-21T21:21:20.536890shield sshd\[26635\]: Invalid user docker from 142.44.160.214 port 34817
2020-06-21T21:21:20.540591shield sshd\[26635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net
2020-06-21T21:21:22.823343shield sshd\[26635\]: Failed password for invalid user docker from 142.44.160.214 port 34817 ssh2
2020-06-22 05:29:27
attackbotsspam
2020-03-13 11:58:50,205 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 142.44.160.214
2020-03-13 12:44:04,535 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 142.44.160.214
2020-03-13 13:31:59,063 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 142.44.160.214
2020-03-13 14:19:29,337 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 142.44.160.214
2020-03-13 14:59:48,101 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 142.44.160.214
...
2020-03-14 03:01:03
attackspam
SSH Bruteforce attack
2020-02-12 01:42:42
attackbotsspam
Feb 11 00:08:33 zulu412 sshd\[31821\]: Invalid user odd from 142.44.160.214 port 47876
Feb 11 00:08:33 zulu412 sshd\[31821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
Feb 11 00:08:35 zulu412 sshd\[31821\]: Failed password for invalid user odd from 142.44.160.214 port 47876 ssh2
...
2020-02-11 07:14:45
attack
Feb  9 06:08:49 srv-ubuntu-dev3 sshd[58281]: Invalid user rwa from 142.44.160.214
Feb  9 06:08:49 srv-ubuntu-dev3 sshd[58281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
Feb  9 06:08:49 srv-ubuntu-dev3 sshd[58281]: Invalid user rwa from 142.44.160.214
Feb  9 06:08:50 srv-ubuntu-dev3 sshd[58281]: Failed password for invalid user rwa from 142.44.160.214 port 41274 ssh2
Feb  9 06:12:07 srv-ubuntu-dev3 sshd[58777]: Invalid user yee from 142.44.160.214
Feb  9 06:12:07 srv-ubuntu-dev3 sshd[58777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
Feb  9 06:12:07 srv-ubuntu-dev3 sshd[58777]: Invalid user yee from 142.44.160.214
Feb  9 06:12:09 srv-ubuntu-dev3 sshd[58777]: Failed password for invalid user yee from 142.44.160.214 port 56181 ssh2
Feb  9 06:15:21 srv-ubuntu-dev3 sshd[59013]: Invalid user nzp from 142.44.160.214
...
2020-02-09 14:59:37
attack
Unauthorized connection attempt detected from IP address 142.44.160.214 to port 2220 [J]
2020-02-02 04:25:40
attack
Jan 26 14:15:48 163-172-32-151 sshd[15613]: Invalid user hath from 142.44.160.214 port 57600
...
2020-01-26 21:32:16
attackspam
Jan 11 15:52:05 vps691689 sshd[15068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
Jan 11 15:52:08 vps691689 sshd[15068]: Failed password for invalid user deploy from 142.44.160.214 port 36905 ssh2
...
2020-01-11 23:09:54
attackbots
Dec 21 23:48:17 ny01 sshd[28423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
Dec 21 23:48:18 ny01 sshd[28423]: Failed password for invalid user marianna from 142.44.160.214 port 43195 ssh2
Dec 21 23:55:10 ny01 sshd[29544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
2019-12-22 13:33:01
attack
Dec 16 22:59:14 cvbnet sshd[18921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214 
Dec 16 22:59:16 cvbnet sshd[18921]: Failed password for invalid user cude from 142.44.160.214 port 35106 ssh2
...
2019-12-17 06:59:00
attack
2019-12-14T16:27:42.871175-07:00 suse-nuc sshd[31709]: Invalid user ezaki from 142.44.160.214 port 36197
...
2019-12-15 08:36:34
attackspambots
Dec  6 08:43:04 [host] sshd[29829]: Invalid user sukku from 142.44.160.214
Dec  6 08:43:04 [host] sshd[29829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
Dec  6 08:43:06 [host] sshd[29829]: Failed password for invalid user sukku from 142.44.160.214 port 46339 ssh2
2019-12-06 21:25:57
attackbotsspam
fail2ban
2019-12-01 02:38:28
attackbotsspam
2019-11-23T09:07:45.692862struts4.enskede.local sshd\[10716\]: Invalid user doremi from 142.44.160.214 port 42007
2019-11-23T09:07:45.702750struts4.enskede.local sshd\[10716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net
2019-11-23T09:07:48.565026struts4.enskede.local sshd\[10716\]: Failed password for invalid user doremi from 142.44.160.214 port 42007 ssh2
2019-11-23T09:12:16.093373struts4.enskede.local sshd\[10739\]: Invalid user nguk from 142.44.160.214 port 59906
2019-11-23T09:12:16.102529struts4.enskede.local sshd\[10739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net
...
2019-11-23 18:48:05
attackspambots
2019-11-21T16:08:33.968328abusebot-6.cloudsearch.cf sshd\[1533\]: Invalid user guest from 142.44.160.214 port 35405
2019-11-22 00:32:56
attack
2019-11-20T09:34:53.3502171495-001 sshd\[50503\]: Failed password for invalid user zouzou from 142.44.160.214 port 60739 ssh2
2019-11-20T10:38:54.0100141495-001 sshd\[52713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net  user=root
2019-11-20T10:38:56.2011901495-001 sshd\[52713\]: Failed password for root from 142.44.160.214 port 39599 ssh2
2019-11-20T10:42:55.3995831495-001 sshd\[52833\]: Invalid user travers from 142.44.160.214 port 57700
2019-11-20T10:42:55.4047771495-001 sshd\[52833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net
2019-11-20T10:42:57.4397831495-001 sshd\[52833\]: Failed password for invalid user travers from 142.44.160.214 port 57700 ssh2
...
2019-11-21 00:31:28
attack
Nov 19 17:10:09 MK-Soft-VM5 sshd[13824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214 
Nov 19 17:10:11 MK-Soft-VM5 sshd[13824]: Failed password for invalid user heate from 142.44.160.214 port 40476 ssh2
...
2019-11-20 00:27:17
attackbots
Nov 17 07:49:19 server sshd\[12587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net  user=root
Nov 17 07:49:22 server sshd\[12587\]: Failed password for root from 142.44.160.214 port 50610 ssh2
Nov 17 08:00:30 server sshd\[15856\]: Invalid user mayako from 142.44.160.214
Nov 17 08:00:30 server sshd\[15856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net 
Nov 17 08:00:32 server sshd\[15856\]: Failed password for invalid user mayako from 142.44.160.214 port 58585 ssh2
...
2019-11-17 13:20:21
attackbots
Nov  6 13:02:33 server sshd\[19858\]: User root from 142.44.160.214 not allowed because listed in DenyUsers
Nov  6 13:02:33 server sshd\[19858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214  user=root
Nov  6 13:02:35 server sshd\[19858\]: Failed password for invalid user root from 142.44.160.214 port 34333 ssh2
Nov  6 13:06:51 server sshd\[8105\]: User root from 142.44.160.214 not allowed because listed in DenyUsers
Nov  6 13:06:51 server sshd\[8105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214  user=root
2019-11-06 19:08:48
attack
Nov  1 00:25:12 itv-usvr-01 sshd[13760]: Invalid user dara from 142.44.160.214
Nov  1 00:25:12 itv-usvr-01 sshd[13760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
Nov  1 00:25:12 itv-usvr-01 sshd[13760]: Invalid user dara from 142.44.160.214
Nov  1 00:25:14 itv-usvr-01 sshd[13760]: Failed password for invalid user dara from 142.44.160.214 port 59563 ssh2
Nov  1 00:30:21 itv-usvr-01 sshd[14417]: Invalid user jhon from 142.44.160.214
2019-11-01 03:07:07
attack
2019-10-15T06:04:33.757563ns525875 sshd\[30496\]: Invalid user io from 142.44.160.214 port 49965
2019-10-15T06:04:33.762140ns525875 sshd\[30496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net
2019-10-15T06:04:35.604752ns525875 sshd\[30496\]: Failed password for invalid user io from 142.44.160.214 port 49965 ssh2
2019-10-15T06:13:30.523619ns525875 sshd\[9197\]: Invalid user president from 142.44.160.214 port 52498
2019-10-15T06:13:30.530509ns525875 sshd\[9197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net
2019-10-15T06:13:32.426668ns525875 sshd\[9197\]: Failed password for invalid user president from 142.44.160.214 port 52498 ssh2
2019-10-15T06:18:39.293351ns525875 sshd\[15442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net  user=root
2019-10-15T06:18:41.274648ns525875 sshd\[15442\]: F
...
2019-10-28 18:18:14
attack
Oct 26 05:07:17 localhost sshd[27730]: Invalid user phoenix1 from 142.44.160.214 port 55535
Oct 26 05:07:17 localhost sshd[27730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214 
Oct 26 05:07:17 localhost sshd[27730]: Invalid user phoenix1 from 142.44.160.214 port 55535
Oct 26 05:07:19 localhost sshd[27730]: Failed password for invalid user phoenix1 from 142.44.160.214 port 55535 ssh2
Oct 26 05:11:38 localhost sshd[27781]: Invalid user norman from 142.44.160.214 port 46207
2019-10-26 17:50:22
attack
Oct 20 06:48:27 docs sshd\[25072\]: Invalid user password from 142.44.160.214Oct 20 06:48:29 docs sshd\[25072\]: Failed password for invalid user password from 142.44.160.214 port 50433 ssh2Oct 20 06:52:54 docs sshd\[25189\]: Invalid user p@$$wOrd from 142.44.160.214Oct 20 06:52:56 docs sshd\[25189\]: Failed password for invalid user p@$$wOrd from 142.44.160.214 port 41705 ssh2Oct 20 06:57:29 docs sshd\[25314\]: Invalid user 123123 from 142.44.160.214Oct 20 06:57:31 docs sshd\[25314\]: Failed password for invalid user 123123 from 142.44.160.214 port 32979 ssh2
...
2019-10-20 12:55:32
attackspam
Oct 19 13:57:04 MK-Soft-VM3 sshd[26535]: Failed password for root from 142.44.160.214 port 33253 ssh2
...
2019-10-19 23:21:06
attackspambots
leo_www
2019-10-15 17:48:09
attack
Oct 13 11:36:38 mail sshd\[18494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214  user=root
Oct 13 11:36:39 mail sshd\[18494\]: Failed password for root from 142.44.160.214 port 44314 ssh2
Oct 13 11:41:01 mail sshd\[18631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214  user=root
...
2019-10-13 18:11:24
attackbots
Oct  4 22:30:20 eventyay sshd[29899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
Oct  4 22:30:22 eventyay sshd[29899]: Failed password for invalid user 321 from 142.44.160.214 port 44363 ssh2
Oct  4 22:35:09 eventyay sshd[29992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
...
2019-10-05 04:42:21
attackbots
2019-09-25T12:24:24.266832enmeeting.mahidol.ac.th sshd\[19004\]: Invalid user wetserver from 142.44.160.214 port 45252
2019-09-25T12:24:24.285405enmeeting.mahidol.ac.th sshd\[19004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=214.ip-142-44-160.net
2019-09-25T12:24:26.523729enmeeting.mahidol.ac.th sshd\[19004\]: Failed password for invalid user wetserver from 142.44.160.214 port 45252 ssh2
...
2019-09-25 13:40:13
attackspambots
Sep 14 22:05:09 SilenceServices sshd[4688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
Sep 14 22:05:10 SilenceServices sshd[4688]: Failed password for invalid user victor from 142.44.160.214 port 38735 ssh2
Sep 14 22:09:52 SilenceServices sshd[6876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
2019-09-15 08:08:19
attack
Sep 12 03:17:33 SilenceServices sshd[31874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
Sep 12 03:17:36 SilenceServices sshd[31874]: Failed password for invalid user testing from 142.44.160.214 port 53753 ssh2
Sep 12 03:24:30 SilenceServices sshd[4606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
2019-09-12 09:28:38
Comments on same subnet:
IP Type Details Datetime
142.44.160.40 attackspambots
Oct 13 14:29:59 ip-172-31-16-56 sshd\[28954\]: Failed password for root from 142.44.160.40 port 52366 ssh2\
Oct 13 14:34:52 ip-172-31-16-56 sshd\[29064\]: Invalid user zono from 142.44.160.40\
Oct 13 14:34:54 ip-172-31-16-56 sshd\[29064\]: Failed password for invalid user zono from 142.44.160.40 port 60614 ssh2\
Oct 13 14:39:46 ip-172-31-16-56 sshd\[29298\]: Invalid user niklas from 142.44.160.40\
Oct 13 14:39:48 ip-172-31-16-56 sshd\[29298\]: Failed password for invalid user niklas from 142.44.160.40 port 39776 ssh2\
2020-10-13 22:47:45
142.44.160.40 attackbotsspam
Oct 13 03:43:58 ws26vmsma01 sshd[17540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.40
Oct 13 03:44:00 ws26vmsma01 sshd[17540]: Failed password for invalid user fax2 from 142.44.160.40 port 53732 ssh2
...
2020-10-13 14:08:54
142.44.160.40 attack
Oct 12 23:16:12 buvik sshd[26236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.40
Oct 12 23:16:14 buvik sshd[26236]: Failed password for invalid user lie from 142.44.160.40 port 52492 ssh2
Oct 12 23:19:51 buvik sshd[26610]: Invalid user nadia from 142.44.160.40
...
2020-10-13 06:51:51
142.44.160.40 attack
Aug 27 14:23:05 localhost sshd[124031]: Invalid user publish from 142.44.160.40 port 49806
Aug 27 14:23:05 localhost sshd[124031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.ip-142-44-160.net
Aug 27 14:23:05 localhost sshd[124031]: Invalid user publish from 142.44.160.40 port 49806
Aug 27 14:23:07 localhost sshd[124031]: Failed password for invalid user publish from 142.44.160.40 port 49806 ssh2
Aug 27 14:28:56 localhost sshd[124543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.ip-142-44-160.net  user=root
Aug 27 14:28:57 localhost sshd[124543]: Failed password for root from 142.44.160.40 port 32972 ssh2
...
2020-08-27 22:53:58
142.44.160.40 attackbots
2020-08-21T18:44:13.324412upcloud.m0sh1x2.com sshd[20965]: Invalid user jose from 142.44.160.40 port 46926
2020-08-22 03:53:58
142.44.160.40 attackspambots
Aug  2 20:25:38 IngegnereFirenze sshd[13041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.40  user=root
...
2020-08-03 04:34:21
142.44.160.40 attack
2020-07-20 UTC: (24x) - antonio,cb,damian,dmh,eon,godwin,gpu,hadoop,ibm,isik,joaquin,judith,lesia,louis,pdi,sakinah,school,test(2x),user2,userftp,valentino,why,wqy
2020-07-21 19:57:59
142.44.160.40 attack
2020-07-17T05:53:10.952832n23.at sshd[1158353]: Invalid user test from 142.44.160.40 port 34414
2020-07-17T05:53:13.465659n23.at sshd[1158353]: Failed password for invalid user test from 142.44.160.40 port 34414 ssh2
2020-07-17T05:55:59.706755n23.at sshd[1160794]: Invalid user vnc from 142.44.160.40 port 39648
...
2020-07-17 15:00:50
142.44.160.40 attackspam
Jul 14 17:20:29 vpn01 sshd[20833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.40
Jul 14 17:20:32 vpn01 sshd[20833]: Failed password for invalid user user02 from 142.44.160.40 port 55478 ssh2
...
2020-07-14 23:53:44
142.44.160.40 attackspam
Jul 12 17:56:24 ns382633 sshd\[32074\]: Invalid user creator from 142.44.160.40 port 49672
Jul 12 17:56:24 ns382633 sshd\[32074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.40
Jul 12 17:56:25 ns382633 sshd\[32074\]: Failed password for invalid user creator from 142.44.160.40 port 49672 ssh2
Jul 12 18:08:27 ns382633 sshd\[1593\]: Invalid user cp from 142.44.160.40 port 39138
Jul 12 18:08:27 ns382633 sshd\[1593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.40
2020-07-13 02:09:05
142.44.160.40 attackspambots
<6 unauthorized SSH connections
2020-07-10 16:24:58
142.44.160.40 attackspam
SSH Brute-Force. Ports scanning.
2020-07-07 02:16:06
142.44.160.40 attackspam
2020-06-28T04:09:23.065091shield sshd\[26892\]: Invalid user support from 142.44.160.40 port 35012
2020-06-28T04:09:23.068695shield sshd\[26892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.ip-142-44-160.net
2020-06-28T04:09:24.738901shield sshd\[26892\]: Failed password for invalid user support from 142.44.160.40 port 35012 ssh2
2020-06-28T04:13:18.186093shield sshd\[28581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.ip-142-44-160.net  user=root
2020-06-28T04:13:20.110824shield sshd\[28581\]: Failed password for root from 142.44.160.40 port 36410 ssh2
2020-06-28 12:26:04
142.44.160.173 attackbotsspam
Jun 21 17:17:49 vmd26974 sshd[20616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.173
Jun 21 17:17:51 vmd26974 sshd[20616]: Failed password for invalid user ngu from 142.44.160.173 port 51974 ssh2
...
2020-06-22 02:00:20
142.44.160.173 attackspam
Jun 13 17:41:05 legacy sshd[24560]: Failed password for root from 142.44.160.173 port 59100 ssh2
Jun 13 17:44:26 legacy sshd[24656]: Failed password for www-data from 142.44.160.173 port 56266 ssh2
Jun 13 17:47:46 legacy sshd[24779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.173
...
2020-06-14 00:05:18
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.44.160.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48615
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.44.160.214.			IN	A

;; AUTHORITY SECTION:
.			3339	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052700 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon May 27 15:06:10 CST 2019
;; MSG SIZE  rcvd: 118

Host info
214.160.44.142.in-addr.arpa domain name pointer 214.ip-142-44-160.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
214.160.44.142.in-addr.arpa	name = 214.ip-142-44-160.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
39.69.97.62 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/39.69.97.62/ 
 
 CN - 1H : (938)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 39.69.97.62 
 
 CIDR : 39.64.0.0/11 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 ATTACKS DETECTED ASN4837 :  
  1H - 16 
  3H - 55 
  6H - 112 
 12H - 164 
 24H - 352 
 
 DateTime : 2019-11-15 07:26:19 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-15 17:35:32
91.222.19.225 attack
Nov 15 07:53:42 vps sshd[6570]: Failed password for root from 91.222.19.225 port 51206 ssh2
Nov 15 07:57:55 vps sshd[6760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.222.19.225 
Nov 15 07:57:57 vps sshd[6760]: Failed password for invalid user jody from 91.222.19.225 port 38510 ssh2
...
2019-11-15 17:15:52
157.245.3.83 attackspam
Nov 15 10:59:39 server2 sshd\[31784\]: Invalid user test from 157.245.3.83
Nov 15 10:59:47 server2 sshd\[31786\]: Invalid user test from 157.245.3.83
Nov 15 10:59:57 server2 sshd\[31790\]: Invalid user test from 157.245.3.83
Nov 15 11:03:30 server2 sshd\[32112\]: Invalid user uploader from 157.245.3.83
Nov 15 11:03:40 server2 sshd\[32114\]: Invalid user uploader from 157.245.3.83
Nov 15 11:03:52 server2 sshd\[32116\]: Invalid user uploader from 157.245.3.83
2019-11-15 17:04:25
182.72.104.106 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-11-15 17:02:40
175.147.255.149 attackspambots
3389BruteforceFW21
2019-11-15 17:34:19
162.247.74.7 attack
Automatic report - XMLRPC Attack
2019-11-15 17:24:19
124.42.117.243 attack
Nov 15 10:03:21 OPSO sshd\[19619\]: Invalid user test from 124.42.117.243 port 59319
Nov 15 10:03:21 OPSO sshd\[19619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.42.117.243
Nov 15 10:03:23 OPSO sshd\[19619\]: Failed password for invalid user test from 124.42.117.243 port 59319 ssh2
Nov 15 10:07:49 OPSO sshd\[20435\]: Invalid user zrhzrh from 124.42.117.243 port 48122
Nov 15 10:07:49 OPSO sshd\[20435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.42.117.243
2019-11-15 17:17:47
45.55.248.42 attack
45.55.248.42 - - \[15/Nov/2019:07:26:50 +0100\] "POST /wp-login.php HTTP/1.0" 200 4802 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.55.248.42 - - \[15/Nov/2019:07:26:56 +0100\] "POST /wp-login.php HTTP/1.0" 200 4640 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.55.248.42 - - \[15/Nov/2019:07:27:01 +0100\] "POST /wp-login.php HTTP/1.0" 200 4639 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-15 17:09:55
222.127.101.155 attackbotsspam
Nov 15 07:26:17 vpn01 sshd[25078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.127.101.155
Nov 15 07:26:18 vpn01 sshd[25078]: Failed password for invalid user cloudadmin from 222.127.101.155 port 43107 ssh2
...
2019-11-15 17:36:18
200.196.247.110 attack
Automatic report - Banned IP Access
2019-11-15 17:18:21
212.15.169.6 attackspam
Nov 15 10:22:07 vps sshd[13434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.15.169.6 
Nov 15 10:22:09 vps sshd[13434]: Failed password for invalid user lommer from 212.15.169.6 port 34048 ssh2
Nov 15 10:27:10 vps sshd[13652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.15.169.6 
...
2019-11-15 17:38:13
175.150.50.237 attackbots
Unauthorised access (Nov 15) SRC=175.150.50.237 LEN=40 TTL=111 ID=30454 TCP DPT=8080 WINDOW=29758 SYN
2019-11-15 17:31:05
37.187.140.206 attackbotsspam
37.187.140.206 - - \[15/Nov/2019:07:27:04 +0100\] "POST /wp-login.php HTTP/1.0" 200 5224 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
37.187.140.206 - - \[15/Nov/2019:07:27:05 +0100\] "POST /wp-login.php HTTP/1.0" 200 5039 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
37.187.140.206 - - \[15/Nov/2019:07:27:06 +0100\] "POST /wp-login.php HTTP/1.0" 200 5036 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-15 17:05:38
206.183.108.195 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-15 17:27:57
112.85.42.185 attack
$f2bV_matches
2019-11-15 17:20:09

Recently Reported IPs

236.11.50.143 111.94.169.183 252.95.251.57 252.53.63.219
46.148.11.45 42.13.49.23 118.69.76.189 103.23.144.41
90.161.220.131 61.219.106.107 116.105.227.209 81.215.25.121
188.170.219.222 105.66.14.253 237.154.232.252 54.38.107.115
66.35.57.240 205.224.57.37 6.19.143.55 14.20.145.219