City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.13.129.255
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56348
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.13.129.255.			IN	A
;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022400 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 14:14:58 CST 2022
;; MSG SIZE  rcvd: 107Host 255.129.13.214.in-addr.arpa not found: 2(SERVFAIL)
server can't find 214.13.129.255.in-addr.arpa: SERVFAIL| IP | Type | Details | Datetime | 
|---|---|---|---|
| 159.203.201.135 | attack | 12/08/2019-22:01:06.178528 159.203.201.135 Protocol: 6 ET DROP Dshield Block Listed Source group 1 | 2019-12-09 05:31:36 | 
| 125.27.209.22 | attackbots | Unauthorised access (Dec 8) SRC=125.27.209.22 LEN=52 TTL=116 ID=22534 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Dec 8) SRC=125.27.209.22 LEN=52 TTL=116 ID=26440 DF TCP DPT=445 WINDOW=8192 SYN | 2019-12-09 05:09:49 | 
| 180.230.181.14 | attackbotsspam | SSH Brute Force | 2019-12-09 05:33:25 | 
| 213.55.93.99 | attack | Unauthorized connection attempt detected from IP address 213.55.93.99 to port 445 | 2019-12-09 05:37:15 | 
| 79.137.34.248 | attackbots | $f2bV_matches | 2019-12-09 05:27:35 | 
| 159.65.148.91 | attackbotsspam | Dec 8 20:00:31 server sshd\[3144\]: Invalid user gdm from 159.65.148.91 Dec 8 20:00:31 server sshd\[3144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.148.91 Dec 8 20:00:33 server sshd\[3144\]: Failed password for invalid user gdm from 159.65.148.91 port 39570 ssh2 Dec 8 20:12:07 server sshd\[6248\]: Invalid user ruckiya from 159.65.148.91 Dec 8 20:12:07 server sshd\[6248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.148.91 ... | 2019-12-09 05:17:18 | 
| 222.186.180.8 | attackbots | Dec 8 21:29:25 thevastnessof sshd[17006]: Failed password for root from 222.186.180.8 port 28378 ssh2 ... | 2019-12-09 05:30:10 | 
| 106.12.114.26 | attackspam | Brute-force attempt banned | 2019-12-09 05:28:34 | 
| 216.218.206.99 | attack | 6379/tcp 27017/tcp 21/tcp... [2019-10-08/12-07]33pkt,9pt.(tcp),2pt.(udp) | 2019-12-09 05:25:46 | 
| 180.243.93.243 | attackbots | Fail2Ban Ban Triggered | 2019-12-09 05:11:28 | 
| 183.81.96.11 | attackspambots | Portscan detected | 2019-12-09 05:06:11 | 
| 42.112.105.117 | attackbotsspam | Honeypot attack, port: 81, PTR: PTR record not found | 2019-12-09 05:16:07 | 
| 182.61.61.44 | attackbots | Dec 8 21:17:15 heissa sshd\[11488\]: Invalid user sftp from 182.61.61.44 port 53050 Dec 8 21:17:15 heissa sshd\[11488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.61.44 Dec 8 21:17:17 heissa sshd\[11488\]: Failed password for invalid user sftp from 182.61.61.44 port 53050 ssh2 Dec 8 21:22:47 heissa sshd\[12365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.61.44 user=root Dec 8 21:22:49 heissa sshd\[12365\]: Failed password for root from 182.61.61.44 port 57258 ssh2 | 2019-12-09 05:19:36 | 
| 201.159.154.204 | attackbots | Dec 8 20:23:33 zeus sshd[28326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.159.154.204 Dec 8 20:23:35 zeus sshd[28326]: Failed password for invalid user www from 201.159.154.204 port 45295 ssh2 Dec 8 20:31:02 zeus sshd[28606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.159.154.204 Dec 8 20:31:04 zeus sshd[28606]: Failed password for invalid user dmanager2 from 201.159.154.204 port 56918 ssh2 | 2019-12-09 05:20:04 | 
| 207.154.193.178 | attack | Dec 8 23:01:09 server sshd\[22708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.193.178 user=mysql Dec 8 23:01:11 server sshd\[22708\]: Failed password for mysql from 207.154.193.178 port 50234 ssh2 Dec 8 23:07:55 server sshd\[24361\]: Invalid user support from 207.154.193.178 Dec 8 23:07:55 server sshd\[24361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.193.178 Dec 8 23:07:57 server sshd\[24361\]: Failed password for invalid user support from 207.154.193.178 port 52398 ssh2 ... | 2019-12-09 05:13:23 |