City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: DoD Network Information Center
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.44.84.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58789
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;214.44.84.41. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019063001 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 01 04:25:44 CST 2019
;; MSG SIZE rcvd: 116
41.84.44.214.in-addr.arpa domain name pointer mef-emh.21444.usmc.mil.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
41.84.44.214.in-addr.arpa name = mef-emh.21444.usmc.mil.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
192.81.212.139 | attackbots | Wordpress attack |
2020-04-19 14:22:12 |
70.119.36.169 | attackspam | Automatic report - Port Scan Attack |
2020-04-19 14:09:50 |
104.131.249.57 | attackspambots | Apr 19 08:23:32 lukav-desktop sshd\[5184\]: Invalid user admin from 104.131.249.57 Apr 19 08:23:32 lukav-desktop sshd\[5184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.249.57 Apr 19 08:23:34 lukav-desktop sshd\[5184\]: Failed password for invalid user admin from 104.131.249.57 port 46489 ssh2 Apr 19 08:31:03 lukav-desktop sshd\[5466\]: Invalid user la from 104.131.249.57 Apr 19 08:31:03 lukav-desktop sshd\[5466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.249.57 |
2020-04-19 14:28:49 |
77.40.83.168 | attackspambots | Brute force attempt |
2020-04-19 14:25:01 |
142.44.133.94 | attackspambots | Automatic report - XMLRPC Attack |
2020-04-19 14:20:38 |
151.69.170.146 | attack | Invalid user admin from 151.69.170.146 port 50721 |
2020-04-19 14:37:24 |
61.84.190.213 | attackbots | trying to access non-authorized port |
2020-04-19 14:14:03 |
150.223.18.234 | attack | Apr 19 09:22:19 Enigma sshd[30911]: Failed password for invalid user test from 150.223.18.234 port 33175 ssh2 Apr 19 09:25:24 Enigma sshd[31458]: Invalid user ty from 150.223.18.234 port 45710 Apr 19 09:25:24 Enigma sshd[31458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.18.234 Apr 19 09:25:24 Enigma sshd[31458]: Invalid user ty from 150.223.18.234 port 45710 Apr 19 09:25:27 Enigma sshd[31458]: Failed password for invalid user ty from 150.223.18.234 port 45710 ssh2 |
2020-04-19 14:34:57 |
113.86.137.15 | attack | Fail2Ban Ban Triggered |
2020-04-19 14:02:42 |
200.13.195.70 | attackbots | Invalid user techuser from 200.13.195.70 port 53348 |
2020-04-19 14:31:27 |
51.255.197.164 | attackspam | (sshd) Failed SSH login from 51.255.197.164 (FR/France/164.ip-51-255-197.eu): 5 in the last 3600 secs |
2020-04-19 14:33:39 |
106.13.97.10 | attack | SSH brute-force attempt |
2020-04-19 14:37:44 |
49.232.162.235 | attackspam | SSH Authentication Attempts Exceeded |
2020-04-19 14:16:09 |
61.91.64.62 | attackbots | Dovecot Invalid User Login Attempt. |
2020-04-19 14:34:14 |
71.58.90.64 | attackbotsspam | Apr 19 07:53:01 pornomens sshd\[26168\]: Invalid user testmail1 from 71.58.90.64 port 39904 Apr 19 07:53:01 pornomens sshd\[26168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.58.90.64 Apr 19 07:53:02 pornomens sshd\[26168\]: Failed password for invalid user testmail1 from 71.58.90.64 port 39904 ssh2 ... |
2020-04-19 14:18:40 |