City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.214.45.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61736
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.214.45.71. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 03:05:09 CST 2025
;; MSG SIZE rcvd: 106
Host 71.45.214.214.in-addr.arpa not found: 2(SERVFAIL)
server can't find 214.214.45.71.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
51.195.136.14 | attackspam | Sep 6 21:41:50 vps-51d81928 sshd[268868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.136.14 Sep 6 21:41:50 vps-51d81928 sshd[268868]: Invalid user alfred from 51.195.136.14 port 45172 Sep 6 21:41:52 vps-51d81928 sshd[268868]: Failed password for invalid user alfred from 51.195.136.14 port 45172 ssh2 Sep 6 21:46:27 vps-51d81928 sshd[269008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.136.14 user=root Sep 6 21:46:29 vps-51d81928 sshd[269008]: Failed password for root from 51.195.136.14 port 49796 ssh2 ... |
2020-09-07 07:33:13 |
94.200.179.62 | attackspambots | 2020-09-06T19:47:42.411532snf-827550 sshd[5788]: Failed password for root from 94.200.179.62 port 45908 ssh2 2020-09-06T19:51:41.712169snf-827550 sshd[5796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.200.179.62 user=root 2020-09-06T19:51:43.797299snf-827550 sshd[5796]: Failed password for root from 94.200.179.62 port 51034 ssh2 ... |
2020-09-07 07:24:49 |
41.137.132.3 | attackbots | 2020-09-06 18:50:59 1kExsY-00080v-P7 SMTP connection from \(\[41.137.132.3\]\) \[41.137.132.3\]:13346 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-09-06 18:51:04 1kExsd-000818-AT SMTP connection from \(\[41.137.132.3\]\) \[41.137.132.3\]:13390 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-09-06 18:51:06 1kExsg-00081E-5o SMTP connection from \(\[41.137.132.3\]\) \[41.137.132.3\]:13418 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-09-07 07:52:25 |
35.229.141.62 | attackbotsspam | 2020-09-06T20:37:32.079300vps-d63064a2 sshd[16380]: Invalid user nx from 35.229.141.62 port 60180 2020-09-06T20:37:33.820423vps-d63064a2 sshd[16380]: Failed password for invalid user nx from 35.229.141.62 port 60180 ssh2 2020-09-06T20:44:38.318776vps-d63064a2 sshd[16452]: Invalid user server from 35.229.141.62 port 34785 2020-09-06T20:44:38.330464vps-d63064a2 sshd[16452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.229.141.62 2020-09-06T20:44:38.318776vps-d63064a2 sshd[16452]: Invalid user server from 35.229.141.62 port 34785 2020-09-06T20:44:40.878494vps-d63064a2 sshd[16452]: Failed password for invalid user server from 35.229.141.62 port 34785 ssh2 ... |
2020-09-07 07:55:59 |
122.51.37.26 | attackspambots | SSH login attempts. |
2020-09-07 07:31:51 |
122.163.126.206 | attackbotsspam | Time: Sun Sep 6 23:57:27 2020 +0200 IP: 122.163.126.206 (IN/India/abts-north-dynamic-206.126.163.122.airtelbroadband.in) Failures: 5 (sshd) Interval: 3600 seconds Blocked: Permanent Block [LF_SSHD] Log entries: Sep 6 23:39:25 mail-01 sshd[4061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.163.126.206 user=root Sep 6 23:39:27 mail-01 sshd[4061]: Failed password for root from 122.163.126.206 port 32290 ssh2 Sep 6 23:53:00 mail-01 sshd[4723]: Invalid user ubuntu from 122.163.126.206 port 16478 Sep 6 23:53:01 mail-01 sshd[4723]: Failed password for invalid user ubuntu from 122.163.126.206 port 16478 ssh2 Sep 6 23:57:22 mail-01 sshd[5008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.163.126.206 user=root |
2020-09-07 07:26:32 |
93.144.211.134 | attackbotsspam | (Sep 6) LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=51858 TCP DPT=8080 WINDOW=45433 SYN (Sep 6) LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=55039 TCP DPT=8080 WINDOW=62163 SYN (Sep 6) LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=25177 TCP DPT=8080 WINDOW=56618 SYN (Sep 5) LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=60434 TCP DPT=8080 WINDOW=61563 SYN (Sep 5) LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=38753 TCP DPT=8080 WINDOW=29865 SYN (Sep 4) LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=63001 TCP DPT=8080 WINDOW=52666 SYN (Sep 2) LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=59565 TCP DPT=23 WINDOW=2532 SYN (Sep 2) LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=9583 TCP DPT=8080 WINDOW=13441 SYN (Sep 1) LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=16597 TCP DPT=8080 WINDOW=64076 SYN (Aug 31) LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=50329 TCP DPT=8080 WINDOW=64488 SYN (Aug 30) LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=10768 TCP DPT=8080 WINDOW=12601 SYN (Aug 30) LEN=44 TTL=49 ID=7966 TCP DPT=8080 WINDOW=30199 SYN (Aug 30) LEN=4... |
2020-09-07 07:54:26 |
218.237.253.167 | attackspam | This client attempted to login to an administrator account on a Website, or abused from another resource. |
2020-09-07 07:54:51 |
51.75.122.213 | attackspam | SSH login attempts. |
2020-09-07 07:23:35 |
221.127.29.183 | attackbots | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-09-07 07:49:38 |
109.110.167.217 | attack | Honeypot attack, port: 445, PTR: 109-110-167-217-dynamic.shabdiznet.com. |
2020-09-07 07:47:26 |
94.176.187.142 | attackbots | (Sep 7) LEN=52 TTL=114 ID=2013 DF TCP DPT=445 WINDOW=8192 SYN (Sep 6) LEN=52 TTL=114 ID=14568 DF TCP DPT=445 WINDOW=8192 SYN (Sep 6) LEN=52 TTL=114 ID=21143 DF TCP DPT=445 WINDOW=8192 SYN (Sep 6) LEN=52 TTL=117 ID=1358 DF TCP DPT=445 WINDOW=8192 SYN (Sep 6) LEN=52 TTL=114 ID=2425 DF TCP DPT=445 WINDOW=8192 SYN (Sep 6) LEN=52 TTL=114 ID=30765 DF TCP DPT=445 WINDOW=8192 SYN (Sep 6) LEN=52 TTL=117 ID=4674 DF TCP DPT=445 WINDOW=8192 SYN (Sep 5) LEN=52 TTL=117 ID=10376 DF TCP DPT=445 WINDOW=8192 SYN (Sep 5) LEN=52 TTL=117 ID=18623 DF TCP DPT=445 WINDOW=8192 SYN (Sep 5) LEN=52 TTL=117 ID=154 DF TCP DPT=445 WINDOW=8192 SYN (Sep 5) LEN=52 TTL=114 ID=10378 DF TCP DPT=445 WINDOW=8192 SYN (Sep 5) LEN=52 TTL=117 ID=12696 DF TCP DPT=445 WINDOW=8192 SYN (Sep 5) LEN=52 TTL=114 ID=15273 DF TCP DPT=445 WINDOW=8192 SYN (Sep 5) LEN=52 TTL=117 ID=4943 DF TCP DPT=445 WINDOW=8192 SYN (Sep 4) LEN=52 TTL=114 ID=26964 DF TCP DPT=445 WINDOW=8192 SYN (... |
2020-09-07 07:33:55 |
46.229.168.163 | attackspambots | Unauthorized access detected from black listed ip! |
2020-09-07 07:24:00 |
167.248.133.26 | attackspambots |
|
2020-09-07 07:44:49 |
91.121.134.201 | attackbots | SSH login attempts. |
2020-09-07 07:26:45 |