City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.147.191.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17370
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;199.147.191.114. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 17:34:23 CST 2025
;; MSG SIZE rcvd: 108
114.191.147.199.in-addr.arpa domain name pointer 199.147.191.114.4k.usda.gov.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
114.191.147.199.in-addr.arpa name = 199.147.191.114.4k.usda.gov.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 2a01:4f8:c17:41a9::1 | attack | xmlrpc attack |
2020-03-23 19:36:22 |
| 49.88.112.66 | attack | Mar 23 10:04:00 game-panel sshd[3989]: Failed password for root from 49.88.112.66 port 12030 ssh2 Mar 23 10:07:20 game-panel sshd[4087]: Failed password for root from 49.88.112.66 port 58424 ssh2 |
2020-03-23 19:23:24 |
| 106.12.30.133 | attack | Mar 23 09:16:12 vps691689 sshd[26620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.30.133 Mar 23 09:16:15 vps691689 sshd[26620]: Failed password for invalid user abby from 106.12.30.133 port 42668 ssh2 Mar 23 09:20:45 vps691689 sshd[26670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.30.133 ... |
2020-03-23 19:00:58 |
| 79.124.62.66 | attack | 03/23/2020-06:15:42.642123 79.124.62.66 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-23 19:01:26 |
| 145.239.90.193 | attack | Mar 23 09:22:04 nextcloud sshd\[4976\]: Invalid user scottm from 145.239.90.193 Mar 23 09:22:04 nextcloud sshd\[4976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.90.193 Mar 23 09:22:06 nextcloud sshd\[4976\]: Failed password for invalid user scottm from 145.239.90.193 port 52676 ssh2 |
2020-03-23 19:34:35 |
| 182.58.233.91 | attackspambots | 445/tcp [2020-03-23]1pkt |
2020-03-23 19:24:03 |
| 94.45.57.78 | attackspam | Mar 23 10:21:54 hosting180 sshd[2140]: Invalid user gq from 94.45.57.78 port 45688 ... |
2020-03-23 19:13:37 |
| 195.211.87.139 | attackbotsspam | 445/tcp 445/tcp [2020-03-20/23]2pkt |
2020-03-23 19:08:39 |
| 50.209.172.76 | attackbotsspam | ... |
2020-03-23 19:01:56 |
| 67.205.138.198 | attack | Mar 23 18:05:27 webhost01 sshd[3137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.138.198 Mar 23 18:05:29 webhost01 sshd[3137]: Failed password for invalid user queenie from 67.205.138.198 port 58606 ssh2 ... |
2020-03-23 19:15:59 |
| 113.169.91.106 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 23-03-2020 06:35:08. |
2020-03-23 19:25:26 |
| 83.13.209.154 | attackbots | Mar 23 11:00:20 IngegnereFirenze sshd[2797]: Did not receive identification string from 83.13.209.154 port 53744 ... |
2020-03-23 19:41:56 |
| 119.93.152.205 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 23-03-2020 06:35:09. |
2020-03-23 19:20:59 |
| 5.53.35.249 | attackbotsspam | 37215/tcp 37215/tcp [2020-03-20/23]2pkt |
2020-03-23 18:58:27 |
| 71.6.233.236 | attack | 5431/tcp 139/tcp 110/tcp... [2020-01-24/03-23]6pkt,5pt.(tcp),1pt.(udp) |
2020-03-23 19:22:02 |