City: San Jose
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.158.209.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20058
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;199.158.209.214. IN A
;; AUTHORITY SECTION:
. 363 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020090200 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 02 17:10:27 CST 2020
;; MSG SIZE rcvd: 119
Host 214.209.158.199.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 214.209.158.199.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
40.113.153.70 | attackspam | Brute-force attempt banned |
2020-04-14 00:31:33 |
185.9.75.254 | attack | 1586767205 - 04/13/2020 10:40:05 Host: 185.9.75.254/185.9.75.254 Port: 445 TCP Blocked |
2020-04-14 00:33:05 |
128.199.216.168 | attackbotsspam | Apr 13 09:54:20 ny01 sshd[12703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.216.168 Apr 13 09:54:22 ny01 sshd[12703]: Failed password for invalid user johnf from 128.199.216.168 port 33598 ssh2 Apr 13 09:56:05 ny01 sshd[13328]: Failed password for root from 128.199.216.168 port 54474 ssh2 |
2020-04-14 00:12:23 |
60.249.139.217 | attack | 23/tcp 23/tcp 23/tcp [2020-03-26/04-13]3pkt |
2020-04-13 23:47:47 |
205.205.150.58 | attack | 64738/tcp 55553/tcp 55443/tcp... [2020-04-11]269pkt,246pt.(tcp),6pt.(udp) |
2020-04-14 00:29:23 |
122.55.42.243 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-04-14 00:31:18 |
115.236.232.243 | attackspambots | port scan and connect, tcp 23 (telnet) |
2020-04-14 00:21:00 |
192.241.238.98 | attackbotsspam | Unauthorized connection attempt detected from IP address 192.241.238.98 to port 7474 [T] |
2020-04-13 23:59:52 |
104.244.78.213 | attack | Apr 13 18:17:18 debian-2gb-nbg1-2 kernel: \[9053632.103445\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=104.244.78.213 DST=195.201.40.59 LEN=80 TOS=0x00 PREC=0x00 TTL=52 ID=56740 DF PROTO=UDP SPT=34307 DPT=389 LEN=60 |
2020-04-14 00:17:58 |
211.253.10.96 | attack | Apr 13 13:07:20 game-panel sshd[11501]: Failed password for root from 211.253.10.96 port 35324 ssh2 Apr 13 13:09:57 game-panel sshd[11682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.10.96 Apr 13 13:09:58 game-panel sshd[11682]: Failed password for invalid user lizeth from 211.253.10.96 port 44448 ssh2 |
2020-04-13 23:57:20 |
178.62.21.80 | attackbotsspam | 2020-04-13T07:30:24.720350linuxbox-skyline sshd[91754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.21.80 user=root 2020-04-13T07:30:26.425628linuxbox-skyline sshd[91754]: Failed password for root from 178.62.21.80 port 58980 ssh2 ... |
2020-04-14 00:01:28 |
167.114.89.207 | attack | firewall-block, port(s): 8888/tcp |
2020-04-14 00:10:51 |
27.34.30.147 | attackspam | Invalid user openvpn from 27.34.30.147 port 5523 |
2020-04-14 00:32:09 |
118.25.133.121 | attackbotsspam | $f2bV_matches |
2020-04-14 00:30:21 |
144.22.108.33 | attack | Bruteforce detected by fail2ban |
2020-04-14 00:25:06 |