City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.243.160.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62761
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.243.160.42. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 16:09:06 CST 2025
;; MSG SIZE rcvd: 107
b'Host 42.160.243.214.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 214.243.160.42.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
195.225.141.136 | attack | Port 1433 Scan |
2019-12-26 20:32:53 |
124.156.115.227 | attackbots | Dec 26 13:26:01 dedicated sshd[18407]: Invalid user einar from 124.156.115.227 port 34538 |
2019-12-26 20:31:49 |
46.225.242.179 | attack | proto=tcp . spt=60668 . dpt=25 . (Found on Dark List de Dec 26) (278) |
2019-12-26 20:27:22 |
222.186.180.9 | attackspam | k+ssh-bruteforce |
2019-12-26 20:53:29 |
46.151.157.115 | attackspam | email spam |
2019-12-26 20:41:33 |
177.124.184.72 | attack | email spam |
2019-12-26 20:29:39 |
182.48.93.26 | attack | proto=tcp . spt=59179 . dpt=25 . (Found on Blocklist de Dec 25) (279) |
2019-12-26 20:24:26 |
157.230.209.220 | attackspam | Dec 25 15:12:00 server sshd\[22954\]: Invalid user loucks from 157.230.209.220 Dec 25 15:12:00 server sshd\[22954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=odoova.com Dec 25 15:12:02 server sshd\[22954\]: Failed password for invalid user loucks from 157.230.209.220 port 48588 ssh2 Dec 26 09:21:17 server sshd\[30183\]: Invalid user web from 157.230.209.220 Dec 26 09:21:17 server sshd\[30183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=odoova.com ... |
2019-12-26 20:42:32 |
120.71.146.45 | attack | Automatic report - Banned IP Access |
2019-12-26 20:16:52 |
220.184.182.163 | attack | Scanning |
2019-12-26 20:14:53 |
139.59.169.103 | attackspambots | Dec 26 12:09:48 xeon sshd[17815]: Failed password for invalid user operator from 139.59.169.103 port 48970 ssh2 |
2019-12-26 20:34:52 |
106.12.78.161 | attackspambots | Unauthorized connection attempt detected from IP address 106.12.78.161 to port 22 |
2019-12-26 20:52:10 |
164.160.34.111 | attackbots | $f2bV_matches |
2019-12-26 20:47:24 |
161.10.238.226 | attack | Invalid user admin from 161.10.238.226 port 41418 |
2019-12-26 20:19:58 |
62.73.127.10 | attack | Autoban 62.73.127.10 AUTH/CONNECT |
2019-12-26 20:56:16 |