City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.217.139.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;144.217.139.27. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:13:15 CST 2022
;; MSG SIZE rcvd: 107
27.139.217.144.in-addr.arpa domain name pointer r2.a1center.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
27.139.217.144.in-addr.arpa name = r2.a1center.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
211.52.103.197 | attackspambots | Aug 21 05:38:20 MK-Soft-Root2 sshd\[20504\]: Invalid user ds from 211.52.103.197 port 37282 Aug 21 05:38:20 MK-Soft-Root2 sshd\[20504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.52.103.197 Aug 21 05:38:21 MK-Soft-Root2 sshd\[20504\]: Failed password for invalid user ds from 211.52.103.197 port 37282 ssh2 ... |
2019-08-21 12:10:00 |
27.223.163.232 | attackbots | " " |
2019-08-21 12:45:39 |
1.170.145.88 | attackspam | Unauthorized connection attempt from IP address 1.170.145.88 on Port 445(SMB) |
2019-08-21 12:54:03 |
80.99.160.41 | attack | Aug 21 00:23:33 xtremcommunity sshd\[10939\]: Invalid user norbert from 80.99.160.41 port 39984 Aug 21 00:23:33 xtremcommunity sshd\[10939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.99.160.41 Aug 21 00:23:35 xtremcommunity sshd\[10939\]: Failed password for invalid user norbert from 80.99.160.41 port 39984 ssh2 Aug 21 00:27:59 xtremcommunity sshd\[11149\]: Invalid user kalina from 80.99.160.41 port 54636 Aug 21 00:27:59 xtremcommunity sshd\[11149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.99.160.41 ... |
2019-08-21 12:33:46 |
213.164.96.88 | attack | Caught in portsentry honeypot |
2019-08-21 12:28:14 |
87.98.167.38 | attackspam | Aug 21 06:13:11 SilenceServices sshd[11447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.167.38 Aug 21 06:13:14 SilenceServices sshd[11447]: Failed password for invalid user name from 87.98.167.38 port 51770 ssh2 Aug 21 06:15:41 SilenceServices sshd[13411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.98.167.38 |
2019-08-21 12:33:19 |
51.68.122.190 | attackspambots | Aug 21 04:32:36 icinga sshd[28709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.122.190 Aug 21 04:32:38 icinga sshd[28709]: Failed password for invalid user czdlpics from 51.68.122.190 port 35625 ssh2 ... |
2019-08-21 12:34:39 |
159.203.115.76 | attackbotsspam | Jul 31 15:55:39 server sshd\[12485\]: Invalid user sara from 159.203.115.76 Jul 31 15:55:39 server sshd\[12485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.115.76 Jul 31 15:55:41 server sshd\[12485\]: Failed password for invalid user sara from 159.203.115.76 port 43908 ssh2 ... |
2019-08-21 12:59:57 |
151.80.140.166 | attackspam | Jun 27 06:05:11 server sshd\[63641\]: Invalid user www from 151.80.140.166 Jun 27 06:05:11 server sshd\[63641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.140.166 Jun 27 06:05:13 server sshd\[63641\]: Failed password for invalid user www from 151.80.140.166 port 59568 ssh2 ... |
2019-08-21 12:47:08 |
52.66.16.236 | attackbotsspam | Aug 20 18:37:06 auw2 sshd\[16791\]: Invalid user student4 from 52.66.16.236 Aug 20 18:37:06 auw2 sshd\[16791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-66-16-236.ap-south-1.compute.amazonaws.com Aug 20 18:37:08 auw2 sshd\[16791\]: Failed password for invalid user student4 from 52.66.16.236 port 48726 ssh2 Aug 20 18:42:03 auw2 sshd\[17421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-66-16-236.ap-south-1.compute.amazonaws.com user=root Aug 20 18:42:05 auw2 sshd\[17421\]: Failed password for root from 52.66.16.236 port 42318 ssh2 |
2019-08-21 13:00:33 |
187.122.248.48 | attackbotsspam | Unauthorized connection attempt from IP address 187.122.248.48 on Port 445(SMB) |
2019-08-21 12:23:11 |
78.83.113.161 | attackspambots | Aug 21 06:26:39 legacy sshd[6415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.83.113.161 Aug 21 06:26:42 legacy sshd[6415]: Failed password for invalid user amanda from 78.83.113.161 port 47302 ssh2 Aug 21 06:30:43 legacy sshd[6561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.83.113.161 ... |
2019-08-21 12:32:27 |
36.66.67.252 | attackbotsspam | Unauthorized connection attempt from IP address 36.66.67.252 on Port 445(SMB) |
2019-08-21 12:14:11 |
45.79.106.170 | attackspambots | NAME : AS3595 CIDR : 45.79.0.0/16 SYN Flood DDoS Attack AS8001 - block certain countries :) IP: 45.79.106.170 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-08-21 12:37:02 |
200.46.203.19 | attackspam | Unauthorized connection attempt from IP address 200.46.203.19 on Port 445(SMB) |
2019-08-21 12:15:53 |