City: Stockton
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.18.253.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42963
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.18.253.219. IN A
;; AUTHORITY SECTION:
. 455 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020033102 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 17:50:17 CST 2020
;; MSG SIZE rcvd: 118
219.253.18.214.in-addr.arpa domain name pointer host-214-18-253-219.ptr.osd.mil.
219.253.18.214.in-addr.arpa domain name pointer host-214-18-253-219.rtp.osd.mil.
Server: 100.100.2.138
Address: 100.100.2.138#53
Non-authoritative answer:
219.253.18.214.in-addr.arpa name = host-214-18-253-219.ptr.osd.mil.
219.253.18.214.in-addr.arpa name = host-214-18-253-219.rtp.osd.mil.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
185.175.93.23 | attack |
|
2020-08-24 14:45:11 |
106.12.80.246 | attack | Port scan denied |
2020-08-24 14:17:24 |
81.68.120.181 | attackspam | Aug 24 05:54:22 host sshd[14828]: Invalid user benjamin from 81.68.120.181 port 54528 ... |
2020-08-24 14:19:31 |
194.36.108.6 | attack | 4,32-14/10 [bc01/m10] PostRequest-Spammer scoring: zurich |
2020-08-24 14:42:15 |
83.97.20.165 | attackbotsspam | Port scanning [7 denied] |
2020-08-24 14:27:29 |
222.186.175.148 | attack | Aug 24 08:16:14 marvibiene sshd[30046]: Failed password for root from 222.186.175.148 port 12228 ssh2 Aug 24 08:16:19 marvibiene sshd[30046]: Failed password for root from 222.186.175.148 port 12228 ssh2 |
2020-08-24 14:23:51 |
165.227.203.162 | attackspambots | SSH Brute Force |
2020-08-24 14:59:12 |
223.99.22.139 | attack | (sshd) Failed SSH login from 223.99.22.139 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug 24 05:38:04 elude sshd[19332]: Invalid user build from 223.99.22.139 port 59308 Aug 24 05:38:06 elude sshd[19332]: Failed password for invalid user build from 223.99.22.139 port 59308 ssh2 Aug 24 05:50:30 elude sshd[21193]: Invalid user app from 223.99.22.139 port 48804 Aug 24 05:50:31 elude sshd[21193]: Failed password for invalid user app from 223.99.22.139 port 48804 ssh2 Aug 24 05:54:06 elude sshd[21709]: Invalid user lamp from 223.99.22.139 port 56798 |
2020-08-24 14:26:12 |
171.247.169.201 | attackspam | 20/8/24@00:54:22: FAIL: Alarm-Network address from=171.247.169.201 20/8/24@00:54:22: FAIL: Alarm-Network address from=171.247.169.201 ... |
2020-08-24 14:38:51 |
142.93.232.102 | attack | *Port Scan* detected from 142.93.232.102 (NL/Netherlands/North Holland/Amsterdam/-). 4 hits in the last 66 seconds |
2020-08-24 14:24:58 |
89.163.134.171 | attackspam | Aug 24 07:26:36 host sshd[28292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps1994254.fastwebserver.de user=root Aug 24 07:26:38 host sshd[28292]: Failed password for root from 89.163.134.171 port 46716 ssh2 ... |
2020-08-24 14:56:37 |
175.167.198.24 | attackbots | Port Scan detected |
2020-08-24 14:24:10 |
35.196.75.48 | attackbots | 2020-08-24T01:40:55.6846741495-001 sshd[37871]: Failed password for root from 35.196.75.48 port 52912 ssh2 2020-08-24T01:43:19.7141841495-001 sshd[38019]: Invalid user insurgency from 35.196.75.48 port 34448 2020-08-24T01:43:19.7175091495-001 sshd[38019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=48.75.196.35.bc.googleusercontent.com 2020-08-24T01:43:19.7141841495-001 sshd[38019]: Invalid user insurgency from 35.196.75.48 port 34448 2020-08-24T01:43:22.0611381495-001 sshd[38019]: Failed password for invalid user insurgency from 35.196.75.48 port 34448 ssh2 2020-08-24T01:45:31.9677451495-001 sshd[38153]: Invalid user www from 35.196.75.48 port 44230 ... |
2020-08-24 14:54:34 |
61.177.172.54 | attack | Aug 24 08:33:26 nextcloud sshd\[17237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.54 user=root Aug 24 08:33:28 nextcloud sshd\[17237\]: Failed password for root from 61.177.172.54 port 9881 ssh2 Aug 24 08:33:46 nextcloud sshd\[17624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.54 user=root |
2020-08-24 14:41:44 |
185.220.103.8 | attackbots | Aug 23 23:37:29 askasleikir sshd[68804]: Failed password for root from 185.220.103.8 port 46454 ssh2 Aug 23 23:37:33 askasleikir sshd[68804]: Failed password for root from 185.220.103.8 port 46454 ssh2 Aug 23 23:37:23 askasleikir sshd[68804]: Failed password for root from 185.220.103.8 port 46454 ssh2 |
2020-08-24 14:29:42 |