City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.48.121.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14060
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.48.121.19. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 16:35:49 CST 2025
;; MSG SIZE rcvd: 106
19.121.48.214.in-addr.arpa domain name pointer a214-48-121-19.reverse.akamai.csd.disa.mil.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
19.121.48.214.in-addr.arpa name = a214-48-121-19.reverse.akamai.csd.disa.mil.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
103.208.34.199 | attackbotsspam | SSH Brute-Force reported by Fail2Ban |
2020-01-08 22:44:44 |
222.186.42.4 | attackspambots | Jan 8 14:51:02 localhost sshd\[98856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.4 user=root Jan 8 14:51:04 localhost sshd\[98856\]: Failed password for root from 222.186.42.4 port 11474 ssh2 Jan 8 14:51:08 localhost sshd\[98856\]: Failed password for root from 222.186.42.4 port 11474 ssh2 Jan 8 14:51:11 localhost sshd\[98856\]: Failed password for root from 222.186.42.4 port 11474 ssh2 Jan 8 14:51:15 localhost sshd\[98856\]: Failed password for root from 222.186.42.4 port 11474 ssh2 ... |
2020-01-08 22:58:25 |
218.164.2.31 | attackspam | Jan 8 14:04:19 powerpi2 sshd[25092]: Invalid user mrk from 218.164.2.31 port 48360 Jan 8 14:04:22 powerpi2 sshd[25092]: Failed password for invalid user mrk from 218.164.2.31 port 48360 ssh2 Jan 8 14:12:05 powerpi2 sshd[25537]: Invalid user patrick from 218.164.2.31 port 32796 ... |
2020-01-08 22:49:01 |
54.37.136.87 | attack | Automatic report - Banned IP Access |
2020-01-08 22:46:36 |
103.37.201.175 | attackspam | 1578488625 - 01/08/2020 14:03:45 Host: 103.37.201.175/103.37.201.175 Port: 445 TCP Blocked |
2020-01-08 23:34:00 |
18.188.193.177 | attackbotsspam | Jan 8 13:03:58 work-partkepr sshd\[17882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.188.193.177 user=root Jan 8 13:04:00 work-partkepr sshd\[17882\]: Failed password for root from 18.188.193.177 port 50476 ssh2 ... |
2020-01-08 23:27:10 |
37.76.141.211 | attackbotsspam | Lines containing failures of 37.76.141.211 Jan 8 13:46:10 shared05 sshd[14482]: Invalid user admin from 37.76.141.211 port 47372 Jan 8 13:46:11 shared05 sshd[14482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.76.141.211 Jan 8 13:46:13 shared05 sshd[14482]: Failed password for invalid user admin from 37.76.141.211 port 47372 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=37.76.141.211 |
2020-01-08 23:28:43 |
190.34.184.214 | attack | Jan 8 03:30:30 wbs sshd\[27669\]: Invalid user testuser from 190.34.184.214 Jan 8 03:30:30 wbs sshd\[27669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.34.184.214 Jan 8 03:30:32 wbs sshd\[27669\]: Failed password for invalid user testuser from 190.34.184.214 port 52148 ssh2 Jan 8 03:32:51 wbs sshd\[27890\]: Invalid user hjw from 190.34.184.214 Jan 8 03:32:51 wbs sshd\[27890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.34.184.214 |
2020-01-08 22:49:26 |
180.71.47.198 | attackspam | Jan 8 14:04:27 MK-Soft-VM5 sshd[7025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.71.47.198 Jan 8 14:04:28 MK-Soft-VM5 sshd[7025]: Failed password for invalid user wifi from 180.71.47.198 port 49046 ssh2 ... |
2020-01-08 22:59:38 |
123.54.233.228 | attack | 2020-01-08T13:39:42.498443matrix.arvenenaske.de sshd[729884]: Invalid user feered from 123.54.233.228 port 51054 2020-01-08T13:39:42.506087matrix.arvenenaske.de sshd[729884]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.54.233.228 user=feered 2020-01-08T13:39:42.506765matrix.arvenenaske.de sshd[729884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.54.233.228 2020-01-08T13:39:42.498443matrix.arvenenaske.de sshd[729884]: Invalid user feered from 123.54.233.228 port 51054 2020-01-08T13:39:44.269616matrix.arvenenaske.de sshd[729884]: Failed password for invalid user feered from 123.54.233.228 port 51054 ssh2 2020-01-08T13:41:41.952375matrix.arvenenaske.de sshd[729890]: Invalid user ted from 123.54.233.228 port 34430 2020-01-08T13:41:41.958919matrix.arvenenaske.de sshd[729890]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.54.233.228 user=t........ ------------------------------ |
2020-01-08 23:26:16 |
79.133.200.146 | attack | Jan 8 21:02:49 bacztwo courieresmtpd[31438]: error,relay=::ffff:79.133.200.146,from= |
2020-01-08 22:51:12 |
71.190.234.217 | attackspam | rain |
2020-01-08 23:19:47 |
201.182.66.34 | attackbotsspam | *Port Scan* detected from 201.182.66.34 (BR/Brazil/34.66.182.201.equatorialtelecom.com). 11 hits in the last 176 seconds |
2020-01-08 23:15:35 |
103.216.126.5 | attack | Jan 8 13:04:04 sshgateway sshd\[9755\]: Invalid user ian from 103.216.126.5 Jan 8 13:04:04 sshgateway sshd\[9755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.216.126.5 Jan 8 13:04:05 sshgateway sshd\[9755\]: Failed password for invalid user ian from 103.216.126.5 port 50982 ssh2 |
2020-01-08 23:16:37 |
159.89.170.251 | attackbotsspam | 159.89.170.251 - - [08/Jan/2020:14:25:44 +0000] "POST /wp-login.php HTTP/1.1" 200 6409 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 159.89.170.251 - - [08/Jan/2020:14:25:46 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-01-08 22:43:58 |