City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.107.133.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44757
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.107.133.2. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 04:09:11 CST 2025
;; MSG SIZE rcvd: 106
Host 2.133.107.214.in-addr.arpa not found: 2(SERVFAIL)
server can't find 214.107.133.2.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.254.122.202 | attackspambots | Sep 10 17:14:35 lenivpn01 kernel: \[361279.734488\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.254.122.202 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=46167 PROTO=TCP SPT=52679 DPT=33898 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 10 17:57:35 lenivpn01 kernel: \[363860.308825\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.254.122.202 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=25203 PROTO=TCP SPT=52679 DPT=33890 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 10 22:34:14 lenivpn01 kernel: \[380458.067753\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.254.122.202 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=24249 PROTO=TCP SPT=42734 DPT=11111 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 10 23:45:55 lenivpn01 kernel: \[384759.715562\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=185.254.122.202 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x20 ... |
2019-09-12 00:05:17 |
| 193.32.163.44 | attack | Port scan |
2019-09-12 00:56:49 |
| 92.53.65.95 | attackspam | Sep 10 18:03:17 lenivpn01 kernel: \[364201.623226\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=92.53.65.95 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=9517 PROTO=TCP SPT=46590 DPT=8389 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 10 19:11:43 lenivpn01 kernel: \[368308.187912\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=92.53.65.95 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=9037 PROTO=TCP SPT=46590 DPT=33849 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 10 23:02:22 lenivpn01 kernel: \[382146.330113\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=92.53.65.95 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=61677 PROTO=TCP SPT=46590 DPT=3351 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 11 01:01:14 lenivpn01 kernel: \[389277.949460\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=92.53.65.95 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=34366 PRO ... |
2019-09-12 01:27:53 |
| 183.164.247.81 | attackbotsspam | st-nyc1-01 recorded 3 login violations from 183.164.247.81 and was blocked at 2019-09-11 13:02:57. 183.164.247.81 has been blocked on 0 previous occasions. 183.164.247.81's first attempt was recorded at 2019-09-11 13:02:57 |
2019-09-11 23:23:01 |
| 213.32.122.80 | attackspambots | " " |
2019-09-12 00:54:07 |
| 187.44.254.62 | attackspambots | SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2019-09-11 23:30:55 |
| 149.202.164.82 | attackspambots | Sep 11 11:51:56 markkoudstaal sshd[1834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82 Sep 11 11:51:57 markkoudstaal sshd[1834]: Failed password for invalid user CumulusLinux! from 149.202.164.82 port 57494 ssh2 Sep 11 11:58:02 markkoudstaal sshd[2380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82 |
2019-09-11 23:38:52 |
| 54.38.82.14 | attackspambots | Sep 11 11:03:56 vps200512 sshd\[1655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 user=root Sep 11 11:03:58 vps200512 sshd\[1655\]: Failed password for root from 54.38.82.14 port 44318 ssh2 Sep 11 11:03:58 vps200512 sshd\[1657\]: Invalid user admin from 54.38.82.14 Sep 11 11:03:58 vps200512 sshd\[1657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14 Sep 11 11:04:01 vps200512 sshd\[1657\]: Failed password for invalid user admin from 54.38.82.14 port 46102 ssh2 |
2019-09-11 23:15:44 |
| 51.77.150.235 | attackbots | Sep 11 11:42:40 SilenceServices sshd[25816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.150.235 Sep 11 11:42:42 SilenceServices sshd[25816]: Failed password for invalid user !QAZ1qaz from 51.77.150.235 port 58743 ssh2 Sep 11 11:48:28 SilenceServices sshd[27941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.150.235 |
2019-09-11 23:18:36 |
| 162.144.89.205 | attackspambots | Port scan attempt detected by AWS-CCS, CTS, India |
2019-09-12 01:10:54 |
| 185.216.140.252 | attackspam | 09/11/2019-11:51:49.148999 185.216.140.252 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-09-12 00:08:01 |
| 89.248.168.202 | attackbots | 09/11/2019-11:09:51.823318 89.248.168.202 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 100 |
2019-09-12 00:28:36 |
| 119.163.244.32 | attackbotsspam | Wed, 2019-08-07 16:05:38 - TCP Packet - Source:119.163.244.32,22234 Destination:,80 - [DVR-HTTP rule match] |
2019-09-11 23:45:39 |
| 92.119.160.125 | attack | Port scan on 8 port(s): 3532 3536 3558 3575 3591 3609 3614 3672 |
2019-09-12 01:21:19 |
| 159.203.199.195 | attackbotsspam | " " |
2019-09-12 00:16:06 |