City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.203.213.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;195.203.213.214.		IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 22:14:51 CST 2025
;; MSG SIZE  rcvd: 108Host 214.213.203.195.in-addr.arpa. not found: 3(NXDOMAIN)
Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 214.213.203.195.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 212.87.9.155 | attackbots | Aug 8 06:49:04 localhost sshd\[1899\]: Invalid user usuario1 from 212.87.9.155 port 35892 Aug 8 06:49:04 localhost sshd\[1899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.87.9.155 Aug 8 06:49:06 localhost sshd\[1899\]: Failed password for invalid user usuario1 from 212.87.9.155 port 35892 ssh2 | 2019-08-08 15:38:22 | 
| 198.20.99.130 | attackspambots | Portscan or hack attempt detected by psad/fwsnort | 2019-08-08 16:21:48 | 
| 188.0.9.141 | attack | [portscan] Port scan | 2019-08-08 15:47:01 | 
| 49.151.203.59 | attack | Honeypot attack, port: 445, PTR: dsl.49.151.203.59.pldt.net. | 2019-08-08 16:17:39 | 
| 218.86.123.242 | attackspam | Aug 6 21:32:37 cp1server sshd[31580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.86.123.242 user=r.r Aug 6 21:32:39 cp1server sshd[31580]: Failed password for r.r from 218.86.123.242 port 19495 ssh2 Aug 6 21:32:39 cp1server sshd[31581]: Received disconnect from 218.86.123.242: 11: Bye Bye Aug 6 21:44:06 cp1server sshd[392]: Invalid user hostmaster from 218.86.123.242 Aug 6 21:44:06 cp1server sshd[392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.86.123.242 Aug 6 21:44:08 cp1server sshd[392]: Failed password for invalid user hostmaster from 218.86.123.242 port 15194 ssh2 Aug 6 21:44:08 cp1server sshd[393]: Received disconnect from 218.86.123.242: 11: Bye Bye Aug 6 21:47:52 cp1server sshd[1028]: Invalid user dakota from 218.86.123.242 Aug 6 21:47:52 cp1server sshd[1028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.86.1........ ------------------------------- | 2019-08-08 15:41:26 | 
| 156.208.223.85 | attackspam | Honeypot attack, port: 23, PTR: host-156.208.85.223-static.tedata.net. | 2019-08-08 16:20:48 | 
| 113.173.186.64 | attackbotsspam | port scan and connect, tcp 22 (ssh) | 2019-08-08 15:56:18 | 
| 2001:41d0:8:5cc3:: | attackbots | xmlrpc attack | 2019-08-08 15:43:29 | 
| 185.49.64.6 | attackbots | Honeypot attack, port: 23, PTR: PTR record not found | 2019-08-08 15:53:23 | 
| 159.203.179.230 | attack | Aug 8 04:29:13 host sshd\[16514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.179.230 user=root Aug 8 04:29:15 host sshd\[16514\]: Failed password for root from 159.203.179.230 port 40210 ssh2 ... | 2019-08-08 16:09:03 | 
| 177.9.124.74 | attackbotsspam | Honeypot attack, port: 23, PTR: 177-9-124-74.dsl.telesp.net.br. | 2019-08-08 16:12:47 | 
| 179.124.204.194 | attackspam | Excessive failed login attempts on port 587 | 2019-08-08 15:33:40 | 
| 81.19.8.110 | attackbotsspam | Aug 8 09:47:35 icinga sshd[3777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.19.8.110 Aug 8 09:47:37 icinga sshd[3777]: Failed password for invalid user testing from 81.19.8.110 port 50503 ssh2 ... | 2019-08-08 15:58:01 | 
| 59.175.15.245 | attackbotsspam | Honeypot attack, port: 81, PTR: PTR record not found | 2019-08-08 15:53:46 | 
| 180.122.65.48 | attackspam | Honeypot attack, port: 5555, PTR: PTR record not found | 2019-08-08 16:05:35 |