City: Taipei
Region: Taipei
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.21.86.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44386
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;163.21.86.244. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 01:57:42 CST 2025
;; MSG SIZE rcvd: 106
Host 244.86.21.163.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 244.86.21.163.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
94.31.181.195 | attackbotsspam | Unauthorised access (Jun 12) SRC=94.31.181.195 LEN=52 PREC=0x20 TTL=116 ID=13394 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Jun 8) SRC=94.31.181.195 LEN=52 PREC=0x20 TTL=116 ID=32629 DF TCP DPT=445 WINDOW=8192 SYN |
2020-06-12 20:12:41 |
123.207.34.86 | attack | frenzy |
2020-06-12 20:18:53 |
218.92.0.145 | attackbotsspam | Jun 12 14:19:27 cosmoit sshd[12471]: Failed password for root from 218.92.0.145 port 4480 ssh2 |
2020-06-12 20:33:30 |
196.52.43.109 | attack | srv02 Mass scanning activity detected Target: 5916 .. |
2020-06-12 20:08:40 |
216.83.45.162 | attackspam | Jun 12 14:31:50 srv-ubuntu-dev3 sshd[15794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.83.45.162 user=root Jun 12 14:31:51 srv-ubuntu-dev3 sshd[15794]: Failed password for root from 216.83.45.162 port 56612 ssh2 Jun 12 14:32:27 srv-ubuntu-dev3 sshd[15894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.83.45.162 user=root Jun 12 14:32:29 srv-ubuntu-dev3 sshd[15894]: Failed password for root from 216.83.45.162 port 35624 ssh2 Jun 12 14:33:05 srv-ubuntu-dev3 sshd[15977]: Invalid user ashlyn from 216.83.45.162 Jun 12 14:33:05 srv-ubuntu-dev3 sshd[15977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.83.45.162 Jun 12 14:33:05 srv-ubuntu-dev3 sshd[15977]: Invalid user ashlyn from 216.83.45.162 Jun 12 14:33:06 srv-ubuntu-dev3 sshd[15977]: Failed password for invalid user ashlyn from 216.83.45.162 port 42862 ssh2 Jun 12 14:33:42 srv-ubuntu-dev3 sshd[16 ... |
2020-06-12 20:34:01 |
114.67.254.72 | attack | Jun 12 08:09:43 Host-KEWR-E sshd[31645]: Disconnected from invalid user root 114.67.254.72 port 38204 [preauth] ... |
2020-06-12 20:21:20 |
49.88.112.60 | attackspam | Jun 12 14:08:35 vps sshd[560849]: Failed password for root from 49.88.112.60 port 55833 ssh2 Jun 12 14:08:38 vps sshd[560849]: Failed password for root from 49.88.112.60 port 55833 ssh2 Jun 12 14:09:42 vps sshd[565700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.60 user=root Jun 12 14:09:44 vps sshd[565700]: Failed password for root from 49.88.112.60 port 15682 ssh2 Jun 12 14:09:46 vps sshd[565700]: Failed password for root from 49.88.112.60 port 15682 ssh2 ... |
2020-06-12 20:20:42 |
37.49.226.62 | attack | prod6 ... |
2020-06-12 20:20:28 |
87.251.74.50 | attackspambots | Jun 12 12:19:49 django-0 sshd\[5644\]: Invalid user admin from 87.251.74.50Jun 12 12:19:49 django-0 sshd\[5645\]: Invalid user user from 87.251.74.50Jun 12 12:19:54 django-0 sshd\[5644\]: Failed password for invalid user admin from 87.251.74.50 port 36488 ssh2 ... |
2020-06-12 20:13:24 |
192.144.239.87 | attackspambots | Jun 12 17:09:54 gw1 sshd[12355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.239.87 Jun 12 17:09:56 gw1 sshd[12355]: Failed password for invalid user helton12345 from 192.144.239.87 port 57050 ssh2 ... |
2020-06-12 20:11:26 |
52.91.165.133 | attackspambots | Jun 12 13:50:49 ourumov-web sshd\[26657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.91.165.133 user=root Jun 12 13:50:51 ourumov-web sshd\[26657\]: Failed password for root from 52.91.165.133 port 51542 ssh2 Jun 12 14:09:43 ourumov-web sshd\[27934\]: Invalid user joe from 52.91.165.133 port 49532 ... |
2020-06-12 20:21:52 |
124.78.152.241 | attackbots | Jun 12 05:40:47 prox sshd[15070]: Failed password for root from 124.78.152.241 port 57022 ssh2 Jun 12 05:48:27 prox sshd[27378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.78.152.241 |
2020-06-12 20:03:54 |
112.85.42.172 | attackspambots | Unauthorized SSH login attempts |
2020-06-12 20:06:12 |
103.129.223.98 | attackspambots | Invalid user webuser from 103.129.223.98 port 54584 |
2020-06-12 20:00:52 |
110.49.70.246 | attackbots | Fail2Ban Ban Triggered (2) |
2020-06-12 20:23:21 |