City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.20.129.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31395
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.20.129.248. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 14:45:12 CST 2025
;; MSG SIZE rcvd: 107
b'Host 248.129.20.214.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 214.20.129.248.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
185.88.199.46 | attackspambots | Jul 21 22:41:07 cac1d2 sshd\[15132\]: Invalid user user01 from 185.88.199.46 port 31565 Jul 21 22:41:07 cac1d2 sshd\[15132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.88.199.46 Jul 21 22:41:09 cac1d2 sshd\[15132\]: Failed password for invalid user user01 from 185.88.199.46 port 31565 ssh2 ... |
2019-07-22 13:50:46 |
121.134.159.21 | attackbotsspam | Jul 22 05:05:38 ovpn sshd\[27237\]: Invalid user polycom from 121.134.159.21 Jul 22 05:05:38 ovpn sshd\[27237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21 Jul 22 05:05:41 ovpn sshd\[27237\]: Failed password for invalid user polycom from 121.134.159.21 port 44714 ssh2 Jul 22 05:11:00 ovpn sshd\[28189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21 user=root Jul 22 05:11:02 ovpn sshd\[28189\]: Failed password for root from 121.134.159.21 port 40534 ssh2 |
2019-07-22 13:08:59 |
137.63.184.100 | attackbotsspam | Jul 22 06:17:09 minden010 sshd[31835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.184.100 Jul 22 06:17:12 minden010 sshd[31835]: Failed password for invalid user gpadmin from 137.63.184.100 port 38860 ssh2 Jul 22 06:23:16 minden010 sshd[1539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.63.184.100 ... |
2019-07-22 13:20:44 |
114.40.181.242 | attackbots | firewall-block, port(s): 23/tcp |
2019-07-22 13:54:06 |
153.36.232.139 | attackspambots | Jul 22 07:17:23 vps691689 sshd[17904]: Failed password for root from 153.36.232.139 port 59171 ssh2 Jul 22 07:17:33 vps691689 sshd[17906]: Failed password for root from 153.36.232.139 port 30801 ssh2 ... |
2019-07-22 13:17:51 |
218.92.0.194 | attack | Jul 22 06:56:35 eventyay sshd[11015]: Failed password for root from 218.92.0.194 port 25654 ssh2 Jul 22 06:58:07 eventyay sshd[11295]: Failed password for root from 218.92.0.194 port 25385 ssh2 Jul 22 06:58:09 eventyay sshd[11295]: Failed password for root from 218.92.0.194 port 25385 ssh2 ... |
2019-07-22 13:08:30 |
186.64.120.96 | attack | Jul 22 07:42:28 mail sshd\[10197\]: Invalid user ed from 186.64.120.96 port 60652 Jul 22 07:42:28 mail sshd\[10197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.64.120.96 Jul 22 07:42:30 mail sshd\[10197\]: Failed password for invalid user ed from 186.64.120.96 port 60652 ssh2 Jul 22 07:48:46 mail sshd\[11173\]: Invalid user kong from 186.64.120.96 port 56238 Jul 22 07:48:46 mail sshd\[11173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.64.120.96 |
2019-07-22 13:57:55 |
82.162.80.74 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 01:37:54,350 INFO [shellcode_manager] (82.162.80.74) no match, writing hexdump (a11550952b96d074d09a2b89c113922c :2397170) - MS17010 (EternalBlue) |
2019-07-22 13:49:38 |
195.55.235.92 | attackbotsspam | Jul 22 12:33:29 our-server-hostname postfix/smtpd[13147]: connect from unknown[195.55.235.92] Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x Jul x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=195.55.235.92 |
2019-07-22 13:56:51 |
203.24.50.229 | attack | Jul 21 23:02:27 esmtp postfix/smtpd[26965]: lost connection after AUTH from unknown[203.24.50.229] Jul 21 23:02:33 esmtp postfix/smtpd[26963]: lost connection after UNKNOWN from unknown[203.24.50.229] Jul 21 23:02:38 esmtp postfix/smtpd[26965]: lost connection after AUTH from unknown[203.24.50.229] Jul 21 23:02:49 esmtp postfix/smtpd[26963]: lost connection after UNKNOWN from unknown[203.24.50.229] Jul 21 23:02:54 esmtp postfix/smtpd[26965]: lost connection after AUTH from unknown[203.24.50.229] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=203.24.50.229 |
2019-07-22 14:05:06 |
81.133.73.161 | attackspambots | Jul 22 07:50:08 mail sshd\[11409\]: Invalid user sonny from 81.133.73.161 port 58475 Jul 22 07:50:08 mail sshd\[11409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.133.73.161 Jul 22 07:50:10 mail sshd\[11409\]: Failed password for invalid user sonny from 81.133.73.161 port 58475 ssh2 Jul 22 07:54:31 mail sshd\[11969\]: Invalid user ubuntu from 81.133.73.161 port 56812 Jul 22 07:54:31 mail sshd\[11969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.133.73.161 |
2019-07-22 14:01:54 |
198.108.67.97 | attackbotsspam | firewall-block, port(s): 9023/tcp |
2019-07-22 13:24:14 |
46.101.249.232 | attackbots | Jul 21 15:54:25 fwservlet sshd[11960]: Invalid user web from 46.101.249.232 Jul 21 15:54:25 fwservlet sshd[11960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.249.232 Jul 21 15:54:27 fwservlet sshd[11960]: Failed password for invalid user web from 46.101.249.232 port 47997 ssh2 Jul 21 15:54:27 fwservlet sshd[11960]: Received disconnect from 46.101.249.232 port 47997:11: Bye Bye [preauth] Jul 21 15:54:27 fwservlet sshd[11960]: Disconnected from 46.101.249.232 port 47997 [preauth] Jul 22 01:51:33 fwservlet sshd[20554]: Invalid user zp from 46.101.249.232 Jul 22 01:51:33 fwservlet sshd[20554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.249.232 Jul 22 01:51:35 fwservlet sshd[20554]: Failed password for invalid user zp from 46.101.249.232 port 57946 ssh2 Jul 22 01:51:35 fwservlet sshd[20554]: Received disconnect from 46.101.249.232 port 57946:11: Bye Bye [preauth] Jul 22 01........ ------------------------------- |
2019-07-22 13:52:04 |
118.71.114.140 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 01:37:57,112 INFO [shellcode_manager] (118.71.114.140) no match, writing hexdump (3a7fa14346f0f883404fe450f1d26b9a :2104823) - MS17010 (EternalBlue) |
2019-07-22 13:43:32 |
125.64.94.220 | attackspam | 22.07.2019 05:35:41 Connection to port 32753 blocked by firewall |
2019-07-22 13:44:27 |