City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.112.109.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2010
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.112.109.39. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 03:20:35 CST 2025
;; MSG SIZE rcvd: 107
b'Host 39.109.112.214.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 214.112.109.39.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 71.58.90.64 | attackbots | (sshd) Failed SSH login from 71.58.90.64 (US/United States/c-71-58-90-64.hsd1.pa.comcast.net): 10 in the last 3600 secs |
2020-08-28 04:03:20 |
| 145.239.29.217 | attack | MYH,DEF GET /test/wp-login.php GET /test/wp-login.php |
2020-08-28 04:08:15 |
| 188.165.230.118 | attackbotsspam | 188.165.230.118 - - [27/Aug/2020:20:34:37 +0100] "POST /wp-login.php HTTP/1.1" 200 6123 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 188.165.230.118 - - [27/Aug/2020:20:35:55 +0100] "POST /wp-login.php HTTP/1.1" 200 6123 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" 188.165.230.118 - - [27/Aug/2020:20:38:02 +0100] "POST /wp-login.php HTTP/1.1" 200 6123 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36" ... |
2020-08-28 03:52:24 |
| 104.131.55.92 | attackspambots | Aug 27 15:45:15 ny01 sshd[14440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.55.92 Aug 27 15:45:18 ny01 sshd[14440]: Failed password for invalid user fredy from 104.131.55.92 port 57008 ssh2 Aug 27 15:50:08 ny01 sshd[15206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.55.92 |
2020-08-28 03:56:26 |
| 185.153.199.185 | attack | [H1] Blocked by UFW |
2020-08-28 04:05:48 |
| 210.180.0.142 | attackbotsspam | SSH invalid-user multiple login try |
2020-08-28 04:03:58 |
| 118.70.155.60 | attackbotsspam | Aug 28 03:00:51 webhost01 sshd[16781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.155.60 Aug 28 03:00:53 webhost01 sshd[16781]: Failed password for invalid user wcsuser from 118.70.155.60 port 34419 ssh2 ... |
2020-08-28 04:25:14 |
| 111.229.222.7 | attackspam | Aug 27 19:15:23 gw1 sshd[14603]: Failed password for backup from 111.229.222.7 port 37654 ssh2 ... |
2020-08-28 03:48:30 |
| 192.81.209.72 | attackspam | 2020-08-27T11:41:43.120550mail.thespaminator.com sshd[9489]: Invalid user harry from 192.81.209.72 port 44364 2020-08-27T11:41:45.099938mail.thespaminator.com sshd[9489]: Failed password for invalid user harry from 192.81.209.72 port 44364 ssh2 ... |
2020-08-28 04:16:27 |
| 192.241.175.48 | attackspam | 2020-08-27T14:27:34.5657851495-001 sshd[21420]: Invalid user ftpuser from 192.241.175.48 port 58326 2020-08-27T14:27:36.9539981495-001 sshd[21420]: Failed password for invalid user ftpuser from 192.241.175.48 port 58326 ssh2 2020-08-27T14:31:45.7695931495-001 sshd[21642]: Invalid user priyam from 192.241.175.48 port 50780 2020-08-27T14:31:45.7725871495-001 sshd[21642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.175.48 2020-08-27T14:31:45.7695931495-001 sshd[21642]: Invalid user priyam from 192.241.175.48 port 50780 2020-08-27T14:31:47.6154731495-001 sshd[21642]: Failed password for invalid user priyam from 192.241.175.48 port 50780 ssh2 ... |
2020-08-28 04:03:43 |
| 211.159.218.251 | attackspambots | This client attempted to login to an administrator account on a Website, or abused from another resource. |
2020-08-28 04:06:34 |
| 190.74.230.47 | attack | Unauthorised access (Aug 27) SRC=190.74.230.47 LEN=52 TTL=116 ID=15607 DF TCP DPT=445 WINDOW=8192 SYN |
2020-08-28 04:18:26 |
| 190.85.149.170 | attack | 1598532980 - 08/27/2020 14:56:20 Host: 190.85.149.170/190.85.149.170 Port: 445 TCP Blocked |
2020-08-28 04:14:47 |
| 104.198.228.2 | attack | 2020-08-24 12:01:09 server sshd[75354]: Failed password for invalid user cafe from 104.198.228.2 port 46854 ssh2 |
2020-08-28 03:48:51 |
| 157.245.5.133 | attackspambots | 157.245.5.133 - - [27/Aug/2020:13:56:59 +0100] "POST /wp-login.php HTTP/1.1" 200 4434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 157.245.5.133 - - [27/Aug/2020:13:57:01 +0100] "POST /wp-login.php HTTP/1.1" 200 4434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 157.245.5.133 - - [27/Aug/2020:13:57:03 +0100] "POST /wp-login.php HTTP/1.1" 200 4434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-28 03:48:17 |