City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.68.169.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27557
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.68.169.93. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 03:49:22 CST 2025
;; MSG SIZE rcvd: 106
Host 93.169.68.214.in-addr.arpa not found: 2(SERVFAIL)
server can't find 214.68.169.93.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 186.135.89.25 | attackspam | Unauthorized connection attempt detected from IP address 186.135.89.25 to port 23 |
2020-06-01 00:34:13 |
| 49.235.202.65 | attackspam | 2020-05-31T09:14:02.6525141495-001 sshd[48044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.202.65 user=root 2020-05-31T09:14:04.5416621495-001 sshd[48044]: Failed password for root from 49.235.202.65 port 41534 ssh2 2020-05-31T09:18:15.4210141495-001 sshd[48147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.202.65 user=root 2020-05-31T09:18:17.3752691495-001 sshd[48147]: Failed password for root from 49.235.202.65 port 56550 ssh2 2020-05-31T09:22:21.4729301495-001 sshd[48285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.202.65 user=root 2020-05-31T09:22:22.8651381495-001 sshd[48285]: Failed password for root from 49.235.202.65 port 43332 ssh2 ... |
2020-06-01 01:09:21 |
| 101.255.65.138 | attackbots | May 31 17:09:47 web01 sshd[19745]: Failed password for root from 101.255.65.138 port 52736 ssh2 ... |
2020-06-01 01:13:28 |
| 112.80.136.135 | attackspam | Unauthorized connection attempt detected from IP address 112.80.136.135 to port 8088 |
2020-06-01 00:45:42 |
| 1.174.245.114 | attackspam |
|
2020-06-01 01:11:06 |
| 103.10.87.54 | attackbotsspam |
|
2020-06-01 00:47:50 |
| 186.10.125.209 | attack | 2020-05-31T16:49:11.183822server.espacesoutien.com sshd[16855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209 user=root 2020-05-31T16:49:13.252205server.espacesoutien.com sshd[16855]: Failed password for root from 186.10.125.209 port 5006 ssh2 2020-05-31T16:49:55.091120server.espacesoutien.com sshd[16875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209 user=root 2020-05-31T16:49:57.535446server.espacesoutien.com sshd[16875]: Failed password for root from 186.10.125.209 port 29229 ssh2 ... |
2020-06-01 01:15:46 |
| 66.42.30.74 | attackspambots | Unauthorized connection attempt detected from IP address 66.42.30.74 to port 23 |
2020-06-01 00:56:21 |
| 106.75.239.89 | attackbots | Unauthorized connection attempt detected from IP address 106.75.239.89 to port 3389 |
2020-06-01 00:46:39 |
| 180.250.55.195 | attackspambots | May 31 18:55:58 OPSO sshd\[6416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.55.195 user=root May 31 18:56:00 OPSO sshd\[6416\]: Failed password for root from 180.250.55.195 port 44452 ssh2 May 31 19:00:38 OPSO sshd\[7341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.55.195 user=root May 31 19:00:40 OPSO sshd\[7341\]: Failed password for root from 180.250.55.195 port 48304 ssh2 May 31 19:05:20 OPSO sshd\[8764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.55.195 user=root |
2020-06-01 01:05:25 |
| 62.210.108.139 | attackbotsspam | ... |
2020-06-01 01:16:13 |
| 73.149.98.216 | attack | Unauthorized connection attempt detected from IP address 73.149.98.216 to port 22 |
2020-06-01 00:52:38 |
| 102.43.206.48 | attackbotsspam | Unauthorized connection attempt detected from IP address 102.43.206.48 to port 23 |
2020-06-01 00:48:15 |
| 181.28.142.182 | attackbotsspam | Unauthorized connection attempt detected from IP address 181.28.142.182 to port 23 |
2020-06-01 00:37:16 |
| 49.88.112.115 | attackspam | 2020-06-01T01:45:57.876244vivaldi2.tree2.info sshd[7290]: refused connect from 49.88.112.115 (49.88.112.115) 2020-06-01T01:46:49.181861vivaldi2.tree2.info sshd[7314]: refused connect from 49.88.112.115 (49.88.112.115) 2020-06-01T01:47:38.826115vivaldi2.tree2.info sshd[7338]: refused connect from 49.88.112.115 (49.88.112.115) 2020-06-01T01:48:29.815012vivaldi2.tree2.info sshd[7390]: refused connect from 49.88.112.115 (49.88.112.115) 2020-06-01T01:49:19.709552vivaldi2.tree2.info sshd[7408]: refused connect from 49.88.112.115 (49.88.112.115) ... |
2020-06-01 00:58:41 |