City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.21.69.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58533
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.21.69.99. IN A
;; AUTHORITY SECTION:
. 599 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019102901 1800 900 604800 86400
;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 30 10:29:12 CST 2019
;; MSG SIZE rcvd: 116
Host 99.69.21.158.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 99.69.21.158.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 211.20.181.186 | attackspam | Feb 26 15:34:14 |
2020-02-27 02:08:43 |
| 51.89.200.105 | attackspam | Unauthorized SSH login attempts |
2020-02-27 02:17:00 |
| 211.159.187.191 | attackbots | $f2bV_matches |
2020-02-27 02:21:02 |
| 211.169.249.156 | attackspam | $f2bV_matches |
2020-02-27 02:19:08 |
| 213.135.4.164 | attack | suspicious action Wed, 26 Feb 2020 10:35:57 -0300 |
2020-02-27 02:24:17 |
| 148.66.133.91 | attackspambots | Feb 26 18:57:21 serwer sshd\[29450\]: Invalid user VM from 148.66.133.91 port 50970 Feb 26 18:57:21 serwer sshd\[29450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.133.91 Feb 26 18:57:23 serwer sshd\[29450\]: Failed password for invalid user VM from 148.66.133.91 port 50970 ssh2 ... |
2020-02-27 02:06:32 |
| 80.82.70.239 | attackspam | 02/26/2020-12:52:12.068637 80.82.70.239 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-02-27 01:59:55 |
| 200.194.1.254 | attack | Automatic report - Port Scan Attack |
2020-02-27 02:14:03 |
| 14.29.130.153 | attackspam | SSH Bruteforce attempt |
2020-02-27 02:08:21 |
| 45.134.179.63 | attackspam | scans 23 times in preceeding hours on the ports (in chronological order) 39999 63380 2041 8002 8585 50900 12345 33388 33666 33885 6890 7000 9960 8890 38000 53390 8840 48484 51015 33555 24000 7133 9991 resulting in total of 29 scans from 45.134.179.0/24 block. |
2020-02-27 02:03:54 |
| 162.243.129.179 | attack | Unauthorized connection attempt detected from IP address 162.243.129.179 to port 179 |
2020-02-27 01:56:42 |
| 162.243.136.131 | attack | firewall-block, port(s): 465/tcp |
2020-02-27 01:49:05 |
| 104.255.172.34 | attackspambots | $f2bV_matches |
2020-02-27 02:18:33 |
| 92.118.37.86 | attack | Port 20002 scan denied |
2020-02-27 01:59:28 |
| 211.193.60.137 | attackbotsspam | suspicious action Wed, 26 Feb 2020 14:20:11 -0300 |
2020-02-27 02:16:09 |