City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.189.139.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59227
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.189.139.140. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 06:59:47 CST 2025
;; MSG SIZE rcvd: 108
Host 140.139.189.214.in-addr.arpa not found: 2(SERVFAIL)
server can't find 214.189.139.140.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.173.180 | attackspambots | Oct 15 11:52:42 hpm sshd\[323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180 user=root Oct 15 11:52:44 hpm sshd\[323\]: Failed password for root from 222.186.173.180 port 20456 ssh2 Oct 15 11:52:59 hpm sshd\[323\]: Failed password for root from 222.186.173.180 port 20456 ssh2 Oct 15 11:53:07 hpm sshd\[367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180 user=root Oct 15 11:53:09 hpm sshd\[367\]: Failed password for root from 222.186.173.180 port 19010 ssh2 |
2019-10-16 05:54:24 |
| 80.211.179.154 | attackbotsspam | Oct 15 17:42:04 ny01 sshd[2396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.179.154 Oct 15 17:42:06 ny01 sshd[2396]: Failed password for invalid user test from 80.211.179.154 port 33350 ssh2 Oct 15 17:49:10 ny01 sshd[3080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.179.154 |
2019-10-16 05:50:49 |
| 182.61.55.239 | attack | 2019-10-15T22:07:29.376991shield sshd\[8529\]: Invalid user testtest from 182.61.55.239 port 58024 2019-10-15T22:07:29.381259shield sshd\[8529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.55.239 2019-10-15T22:07:30.991435shield sshd\[8529\]: Failed password for invalid user testtest from 182.61.55.239 port 58024 ssh2 2019-10-15T22:11:23.253654shield sshd\[9394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.55.239 user=root 2019-10-15T22:11:25.320640shield sshd\[9394\]: Failed password for root from 182.61.55.239 port 38797 ssh2 |
2019-10-16 06:15:19 |
| 119.30.125.235 | attackspam | Automatic report - Port Scan Attack |
2019-10-16 05:53:34 |
| 109.65.101.187 | attack | 37215/tcp [2019-10-15]1pkt |
2019-10-16 06:05:23 |
| 186.122.147.189 | attack | $f2bV_matches |
2019-10-16 06:23:09 |
| 49.234.31.150 | attack | fraudulent SSH attempt |
2019-10-16 06:22:31 |
| 93.39.228.181 | attack | Automatic report - Port Scan Attack |
2019-10-16 06:17:23 |
| 88.119.207.142 | attack | 2019-10-15T23:40:11.012294lon01.zurich-datacenter.net sshd\[18437\]: Invalid user kingan from 88.119.207.142 port 57040 2019-10-15T23:40:11.016653lon01.zurich-datacenter.net sshd\[18437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88-119-207-142.static.zebra.lt 2019-10-15T23:40:13.429527lon01.zurich-datacenter.net sshd\[18437\]: Failed password for invalid user kingan from 88.119.207.142 port 57040 ssh2 2019-10-15T23:44:03.074833lon01.zurich-datacenter.net sshd\[18524\]: Invalid user gallant from 88.119.207.142 port 40072 2019-10-15T23:44:03.081812lon01.zurich-datacenter.net sshd\[18524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88-119-207-142.static.zebra.lt ... |
2019-10-16 05:47:18 |
| 92.114.119.231 | attackbotsspam | Automatic report - Port Scan Attack |
2019-10-16 06:09:29 |
| 177.242.104.2 | attackbots | 445/tcp [2019-10-15]1pkt |
2019-10-16 05:57:25 |
| 222.186.175.150 | attackbots | Oct 15 23:41:16 fr01 sshd[25565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150 user=root Oct 15 23:41:17 fr01 sshd[25565]: Failed password for root from 222.186.175.150 port 29032 ssh2 ... |
2019-10-16 05:51:35 |
| 49.88.112.114 | attackspambots | 2019-10-15T22:05:52.587832abusebot.cloudsearch.cf sshd\[12925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114 user=root |
2019-10-16 06:08:59 |
| 118.126.111.108 | attackspambots | Oct 15 23:39:22 OPSO sshd\[18740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.111.108 user=root Oct 15 23:39:24 OPSO sshd\[18740\]: Failed password for root from 118.126.111.108 port 45950 ssh2 Oct 15 23:43:45 OPSO sshd\[19285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.111.108 user=root Oct 15 23:43:47 OPSO sshd\[19285\]: Failed password for root from 118.126.111.108 port 54726 ssh2 Oct 15 23:48:11 OPSO sshd\[19989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.111.108 user=root |
2019-10-16 06:01:36 |
| 94.191.108.176 | attackspambots | 2019-10-15T21:38:50.159791shield sshd\[31973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.108.176 user=root 2019-10-15T21:38:52.116175shield sshd\[31973\]: Failed password for root from 94.191.108.176 port 38728 ssh2 2019-10-15T21:43:04.348387shield sshd\[32557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.108.176 user=root 2019-10-15T21:43:06.174301shield sshd\[32557\]: Failed password for root from 94.191.108.176 port 45744 ssh2 2019-10-15T21:47:22.867506shield sshd\[1056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.108.176 user=root |
2019-10-16 05:52:57 |