City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.50.122.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31594
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.50.122.16. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022702 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 06:37:21 CST 2025
;; MSG SIZE rcvd: 106
Host 16.122.50.214.in-addr.arpa not found: 2(SERVFAIL)
server can't find 214.50.122.16.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.60.14.185 | attackbots | SMTP/25/465/587 Probe, BadAuth, BF, SPAM - |
2019-10-18 03:49:05 |
| 201.71.181.160 | attack | Jun 15 00:10:31 odroid64 sshd\[11413\]: Invalid user admin from 201.71.181.160 Jun 15 00:10:31 odroid64 sshd\[11413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.71.181.160 Jun 15 00:10:34 odroid64 sshd\[11413\]: Failed password for invalid user admin from 201.71.181.160 port 60946 ssh2 ... |
2019-10-18 04:02:11 |
| 201.72.58.130 | attack | Apr 30 05:59:40 odroid64 sshd\[30326\]: User root from 201.72.58.130 not allowed because not listed in AllowUsers Apr 30 05:59:40 odroid64 sshd\[30326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.72.58.130 user=root Apr 30 05:59:43 odroid64 sshd\[30326\]: Failed password for invalid user root from 201.72.58.130 port 22793 ssh2 ... |
2019-10-18 03:58:51 |
| 180.101.125.226 | attack | Oct 17 13:29:29 DAAP sshd[20736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.125.226 user=root Oct 17 13:29:32 DAAP sshd[20736]: Failed password for root from 180.101.125.226 port 46470 ssh2 Oct 17 13:34:38 DAAP sshd[20788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.125.226 user=root Oct 17 13:34:41 DAAP sshd[20788]: Failed password for root from 180.101.125.226 port 57172 ssh2 ... |
2019-10-18 03:51:42 |
| 170.254.205.200 | attack | Autoban 170.254.205.200 AUTH/CONNECT |
2019-10-18 04:13:52 |
| 189.213.93.108 | attackspambots | Automatic report - Port Scan |
2019-10-18 03:44:43 |
| 91.121.114.69 | attack | Oct 17 22:53:52 hosting sshd[18074]: Invalid user matthew2 from 91.121.114.69 port 52064 ... |
2019-10-18 04:04:57 |
| 81.22.45.65 | attackspam | 2019-10-17T21:14:41.341011+02:00 lumpi kernel: [1162088.655338] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=13638 PROTO=TCP SPT=42765 DPT=16075 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-10-18 03:42:26 |
| 185.220.101.62 | attackbots | Automatic report - XMLRPC Attack |
2019-10-18 04:15:50 |
| 79.137.87.44 | attackbots | 2019-10-17T15:00:16.595699shield sshd\[8004\]: Invalid user twins from 79.137.87.44 port 52339 2019-10-17T15:00:16.599801shield sshd\[8004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.ip-79-137-87.eu 2019-10-17T15:00:18.355182shield sshd\[8004\]: Failed password for invalid user twins from 79.137.87.44 port 52339 ssh2 2019-10-17T15:04:45.836555shield sshd\[8591\]: Invalid user cme from 79.137.87.44 port 44549 2019-10-17T15:04:45.840812shield sshd\[8591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.ip-79-137-87.eu |
2019-10-18 03:51:18 |
| 182.61.33.47 | attackspambots | Apr 6 12:04:42 odroid64 sshd\[6766\]: Invalid user dave from 182.61.33.47 Apr 6 12:04:42 odroid64 sshd\[6766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.33.47 Apr 6 12:04:44 odroid64 sshd\[6766\]: Failed password for invalid user dave from 182.61.33.47 port 46262 ssh2 Apr 22 04:02:44 odroid64 sshd\[12797\]: Invalid user hoster from 182.61.33.47 Apr 22 04:02:44 odroid64 sshd\[12797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.33.47 Apr 22 04:02:46 odroid64 sshd\[12797\]: Failed password for invalid user hoster from 182.61.33.47 port 60896 ssh2 May 17 20:36:05 odroid64 sshd\[16830\]: Invalid user elvin from 182.61.33.47 May 17 20:36:05 odroid64 sshd\[16830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.33.47 May 17 20:36:07 odroid64 sshd\[16830\]: Failed password for invalid user elvin from 182.61.33.47 port 56552 ssh2 ... |
2019-10-18 03:48:38 |
| 139.199.29.114 | attack | Invalid user pos from 139.199.29.114 port 56658 |
2019-10-18 03:38:16 |
| 200.110.174.137 | attackspambots | Feb 23 07:03:32 odroid64 sshd\[18070\]: Invalid user team from 200.110.174.137 Feb 23 07:03:32 odroid64 sshd\[18070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.110.174.137 Feb 23 07:03:34 odroid64 sshd\[18070\]: Failed password for invalid user team from 200.110.174.137 port 48876 ssh2 Mar 21 13:04:55 odroid64 sshd\[23205\]: Invalid user sharp from 200.110.174.137 Mar 21 13:04:55 odroid64 sshd\[23205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.110.174.137 Mar 21 13:04:57 odroid64 sshd\[23205\]: Failed password for invalid user sharp from 200.110.174.137 port 49896 ssh2 Apr 15 13:58:38 odroid64 sshd\[8642\]: Invalid user finger from 200.110.174.137 Apr 15 13:58:38 odroid64 sshd\[8642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.110.174.137 Apr 15 13:58:40 odroid64 sshd\[8642\]: Failed password for invalid user finger from 200.11 ... |
2019-10-18 03:55:02 |
| 134.73.76.184 | attackspam | Postfix RBL failed |
2019-10-18 03:42:10 |
| 41.220.13.103 | attackbotsspam | Oct 17 22:49:21 sauna sshd[25545]: Failed password for root from 41.220.13.103 port 34228 ssh2 ... |
2019-10-18 03:58:02 |