City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 215.2.104.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63505
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;215.2.104.164. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 03:00:25 CST 2025
;; MSG SIZE rcvd: 106
b'Host 164.104.2.215.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 215.2.104.164.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 49.234.51.242 | attackbots | Nov 4 16:22:57 dedicated sshd[13960]: Invalid user fh from 49.234.51.242 port 51880 |
2019-11-05 01:42:24 |
| 59.63.188.56 | attackbotsspam | Unauthorized connection attempt from IP address 59.63.188.56 on Port 445(SMB) |
2019-11-05 01:41:59 |
| 182.72.31.173 | attack | Unauthorized connection attempt from IP address 182.72.31.173 on Port 445(SMB) |
2019-11-05 01:37:49 |
| 72.52.207.133 | attackbots | Automatic report - XMLRPC Attack |
2019-11-05 02:15:00 |
| 62.234.95.136 | attack | Nov 4 18:23:48 srv206 sshd[1905]: Invalid user shutdown from 62.234.95.136 Nov 4 18:23:48 srv206 sshd[1905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.95.136 Nov 4 18:23:48 srv206 sshd[1905]: Invalid user shutdown from 62.234.95.136 Nov 4 18:23:50 srv206 sshd[1905]: Failed password for invalid user shutdown from 62.234.95.136 port 40981 ssh2 ... |
2019-11-05 01:49:06 |
| 95.210.45.30 | attackspambots | (sshd) Failed SSH login from 95.210.45.30 (IT/Italy/Latium/Rome/95-210-45-30.ip.skylogicnet.com/[AS29286 Skylogic S.p.A.]): 1 in the last 3600 secs |
2019-11-05 01:59:25 |
| 177.91.232.51 | attackbots | Unauthorized connection attempt from IP address 177.91.232.51 on Port 445(SMB) |
2019-11-05 01:46:51 |
| 152.32.101.26 | attack | Unauthorized connection attempt from IP address 152.32.101.26 on Port 445(SMB) |
2019-11-05 01:52:40 |
| 222.186.180.147 | attackbots | Nov 4 19:04:26 root sshd[31738]: Failed password for root from 222.186.180.147 port 49430 ssh2 Nov 4 19:04:30 root sshd[31738]: Failed password for root from 222.186.180.147 port 49430 ssh2 Nov 4 19:04:35 root sshd[31738]: Failed password for root from 222.186.180.147 port 49430 ssh2 Nov 4 19:04:39 root sshd[31738]: Failed password for root from 222.186.180.147 port 49430 ssh2 ... |
2019-11-05 02:05:16 |
| 1.172.231.130 | attackbots | Portscan detected |
2019-11-05 01:41:30 |
| 111.93.24.26 | attackspam | Unauthorized connection attempt from IP address 111.93.24.26 on Port 445(SMB) |
2019-11-05 01:50:45 |
| 180.191.90.203 | attackbotsspam | Unauthorized connection attempt from IP address 180.191.90.203 on Port 445(SMB) |
2019-11-05 01:38:43 |
| 106.13.219.171 | attackspam | $f2bV_matches |
2019-11-05 02:03:25 |
| 92.119.160.106 | attack | Nov 4 18:30:22 mc1 kernel: \[4174928.117273\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=25446 PROTO=TCP SPT=56856 DPT=47298 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 4 18:31:59 mc1 kernel: \[4175025.132659\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=10809 PROTO=TCP SPT=56856 DPT=46686 WINDOW=1024 RES=0x00 SYN URGP=0 Nov 4 18:35:54 mc1 kernel: \[4175259.774039\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=55500 PROTO=TCP SPT=56856 DPT=46775 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-11-05 02:02:16 |
| 46.166.151.47 | attackspambots | \[2019-11-04 13:03:06\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-04T13:03:06.530-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="46462607509",SessionID="0x7fdf2c3f5928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/59932",ACLName="no_extension_match" \[2019-11-04 13:07:15\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-04T13:07:15.445-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="81046462607509",SessionID="0x7fdf2c020748",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/51360",ACLName="no_extension_match" \[2019-11-04 13:11:30\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-04T13:11:30.738-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="981046462607509",SessionID="0x7fdf2c3d9bf8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/50236",ACLName="no_extensio |
2019-11-05 02:15:22 |