City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.192.120.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16370
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.192.120.116. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031002 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 11 08:25:21 CST 2025
;; MSG SIZE rcvd: 108
b'Host 116.120.192.214.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 214.192.120.116.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
27.62.3.211 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 12-12-2019 06:25:16. |
2019-12-12 20:07:12 |
52.88.128.249 | attackspam | 12/12/2019-13:17:20.375502 52.88.128.249 Protocol: 6 SURICATA TLS invalid record/traffic |
2019-12-12 20:19:23 |
103.254.120.222 | attack | Automatic report: SSH brute force attempt |
2019-12-12 20:20:36 |
193.19.119.176 | normal | Is this the same person I was talking to on Plenty of Fish don't know holler |
2019-12-12 20:00:00 |
54.37.230.164 | attackspambots | Dec 12 07:54:43 l02a sshd[3271]: Invalid user squid from 54.37.230.164 Dec 12 07:54:46 l02a sshd[3271]: Failed password for invalid user squid from 54.37.230.164 port 50116 ssh2 Dec 12 07:54:43 l02a sshd[3271]: Invalid user squid from 54.37.230.164 Dec 12 07:54:46 l02a sshd[3271]: Failed password for invalid user squid from 54.37.230.164 port 50116 ssh2 |
2019-12-12 19:48:16 |
83.111.151.245 | attack | Dec 12 01:46:41 plusreed sshd[15967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.111.151.245 user=lp Dec 12 01:46:43 plusreed sshd[15967]: Failed password for lp from 83.111.151.245 port 38262 ssh2 ... |
2019-12-12 19:45:19 |
180.243.14.85 | attackspam | IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking. |
2019-12-12 20:09:17 |
45.122.45.57 | attackbotsspam | Unauthorized connection attempt detected from IP address 45.122.45.57 to port 23 |
2019-12-12 20:23:21 |
112.216.93.141 | attackspam | 2019-12-12T12:20:02.257903 sshd[28346]: Invalid user alinus from 112.216.93.141 port 59264 2019-12-12T12:20:02.271166 sshd[28346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.216.93.141 2019-12-12T12:20:02.257903 sshd[28346]: Invalid user alinus from 112.216.93.141 port 59264 2019-12-12T12:20:04.346124 sshd[28346]: Failed password for invalid user alinus from 112.216.93.141 port 59264 ssh2 2019-12-12T12:26:09.238476 sshd[28421]: Invalid user server from 112.216.93.141 port 35386 ... |
2019-12-12 20:04:16 |
139.215.217.180 | attackbotsspam | $f2bV_matches |
2019-12-12 20:05:25 |
118.32.223.14 | attackbotsspam | Too many connections or unauthorized access detected from Arctic banned ip |
2019-12-12 20:03:08 |
222.184.233.222 | attackspambots | Automatic report: SSH brute force attempt |
2019-12-12 20:24:24 |
182.126.81.62 | attackspambots | 8080/tcp 8080/tcp [2019-12-10/12]2pkt |
2019-12-12 20:14:46 |
42.116.253.249 | attackspambots | $f2bV_matches |
2019-12-12 20:21:11 |
63.81.87.100 | attackspambots | Dec 12 08:17:44 grey postfix/smtpd\[17821\]: NOQUEUE: reject: RCPT from announce.vidyad.com\[63.81.87.100\]: 554 5.7.1 Service unavailable\; Client host \[63.81.87.100\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.81.87.100\]\; from=\ |
2019-12-12 20:18:04 |