City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.104.208.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61585
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.104.208.164. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011501 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 16 10:59:23 CST 2025
;; MSG SIZE rcvd: 108
Host 164.208.104.214.in-addr.arpa. not found: 3(NXDOMAIN)
server can't find 214.104.208.164.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
122.224.232.66 | attackbots | SSH-BruteForce |
2020-04-10 09:30:20 |
222.186.190.14 | attack | (sshd) Failed SSH login from 222.186.190.14 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 10 02:35:07 amsweb01 sshd[8631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.14 user=root Apr 10 02:35:10 amsweb01 sshd[8631]: Failed password for root from 222.186.190.14 port 42544 ssh2 Apr 10 02:35:12 amsweb01 sshd[8631]: Failed password for root from 222.186.190.14 port 42544 ssh2 Apr 10 02:35:15 amsweb01 sshd[8631]: Failed password for root from 222.186.190.14 port 42544 ssh2 Apr 10 03:06:19 amsweb01 sshd[14858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.14 user=root |
2020-04-10 09:11:49 |
51.254.37.156 | attack | k+ssh-bruteforce |
2020-04-10 09:35:56 |
167.71.220.148 | attackspambots | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-04-10 09:29:30 |
222.186.175.23 | attackbots | Apr 10 03:25:21 vmanager6029 sshd\[3852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23 user=root Apr 10 03:25:23 vmanager6029 sshd\[3850\]: error: PAM: Authentication failure for root from 222.186.175.23 Apr 10 03:25:25 vmanager6029 sshd\[3853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.23 user=root |
2020-04-10 09:25:43 |
167.99.153.115 | attackbotsspam | trying to access non-authorized port |
2020-04-10 09:15:18 |
49.232.141.44 | attack | Apr 9 21:59:29 ip-172-31-62-245 sshd\[23798\]: Invalid user git from 49.232.141.44\ Apr 9 21:59:30 ip-172-31-62-245 sshd\[23798\]: Failed password for invalid user git from 49.232.141.44 port 64838 ssh2\ Apr 9 22:04:20 ip-172-31-62-245 sshd\[23851\]: Invalid user sandeep from 49.232.141.44\ Apr 9 22:04:22 ip-172-31-62-245 sshd\[23851\]: Failed password for invalid user sandeep from 49.232.141.44 port 62225 ssh2\ Apr 9 22:09:10 ip-172-31-62-245 sshd\[23959\]: Invalid user admin from 49.232.141.44\ |
2020-04-10 09:32:15 |
45.142.195.2 | attackspambots | Apr 10 02:58:21 relay postfix/smtpd\[30964\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 10 02:59:01 relay postfix/smtpd\[18919\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 10 02:59:51 relay postfix/smtpd\[16908\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 10 03:00:03 relay postfix/smtpd\[30964\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 10 03:00:43 relay postfix/smtpd\[14468\]: warning: unknown\[45.142.195.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-04-10 09:07:54 |
218.92.0.173 | attack | Fail2Ban - SSH Bruteforce Attempt |
2020-04-10 09:19:31 |
219.139.131.131 | attack | SASL PLAIN auth failed: ruser=... |
2020-04-10 09:20:58 |
59.48.76.182 | attackbots | (ftpd) Failed FTP login from 59.48.76.182 (CN/China/-): 10 in the last 3600 secs |
2020-04-10 09:27:28 |
51.79.69.137 | attack | Scanned 3 times in the last 24 hours on port 22 |
2020-04-10 09:01:04 |
119.133.33.65 | attackspam | Fail2Ban Ban Triggered |
2020-04-10 09:24:35 |
73.253.70.51 | attackbotsspam | Apr 9 22:17:38 vps46666688 sshd[31495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.253.70.51 Apr 9 22:17:39 vps46666688 sshd[31495]: Failed password for invalid user postgres from 73.253.70.51 port 47442 ssh2 ... |
2020-04-10 09:28:37 |
51.89.213.90 | attackbotsspam | Automatic report - XMLRPC Attack |
2020-04-10 09:19:09 |