City: Canterbury
Region: England
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: Jisc Services Limited
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.66.214.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14876
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.66.214.4. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019081900 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 20 00:30:35 CST 2019
;; MSG SIZE rcvd: 116
4.214.66.194.in-addr.arpa domain name pointer dhcp-194-66-214-4.canterbury.ac.uk.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
4.214.66.194.in-addr.arpa name = dhcp-194-66-214-4.canterbury.ac.uk.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
150.129.164.11 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-11 05:22:17 |
106.12.93.25 | attack | Feb 10 18:07:32 silence02 sshd[2640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.25 Feb 10 18:07:35 silence02 sshd[2640]: Failed password for invalid user ha from 106.12.93.25 port 34246 ssh2 Feb 10 18:11:05 silence02 sshd[2870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.25 |
2020-02-11 04:50:37 |
139.59.43.104 | attackspam | Portscan or hack attempt detected by psad/fwsnort |
2020-02-11 05:02:31 |
77.231.70.245 | attackbotsspam | Automatic report - Port Scan Attack |
2020-02-11 05:16:42 |
103.76.22.115 | attack | Feb 10 16:41:24 MK-Soft-Root2 sshd[3685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.22.115 Feb 10 16:41:26 MK-Soft-Root2 sshd[3685]: Failed password for invalid user pd from 103.76.22.115 port 45806 ssh2 ... |
2020-02-11 05:24:18 |
51.15.87.74 | attackbotsspam | $f2bV_matches |
2020-02-11 04:56:56 |
218.92.0.145 | attack | 2020-02-10T20:45:55.394657abusebot-2.cloudsearch.cf sshd[8393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145 user=root 2020-02-10T20:45:56.538532abusebot-2.cloudsearch.cf sshd[8393]: Failed password for root from 218.92.0.145 port 44931 ssh2 2020-02-10T20:46:00.189585abusebot-2.cloudsearch.cf sshd[8393]: Failed password for root from 218.92.0.145 port 44931 ssh2 2020-02-10T20:45:55.394657abusebot-2.cloudsearch.cf sshd[8393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145 user=root 2020-02-10T20:45:56.538532abusebot-2.cloudsearch.cf sshd[8393]: Failed password for root from 218.92.0.145 port 44931 ssh2 2020-02-10T20:46:00.189585abusebot-2.cloudsearch.cf sshd[8393]: Failed password for root from 218.92.0.145 port 44931 ssh2 2020-02-10T20:45:55.394657abusebot-2.cloudsearch.cf sshd[8393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218. ... |
2020-02-11 04:54:06 |
45.64.134.179 | attack | 1433/tcp 445/tcp... [2019-12-17/2020-02-10]11pkt,2pt.(tcp) |
2020-02-11 05:08:55 |
202.112.114.204 | attack | $f2bV_matches |
2020-02-11 04:49:01 |
198.108.66.95 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-11 04:54:28 |
185.173.35.45 | attackbotsspam | Automatic report - Banned IP Access |
2020-02-11 04:54:51 |
198.108.66.93 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-11 05:07:16 |
198.108.66.92 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-11 05:10:25 |
210.223.193.10 | attackspambots | Honeypot attack, port: 81, PTR: PTR record not found |
2020-02-11 05:02:02 |
62.77.113.186 | attackbotsspam | port scan and connect, tcp 23 (telnet) |
2020-02-11 05:23:07 |