City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.254.141.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1486
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;254.254.141.221. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 15:23:46 CST 2025
;; MSG SIZE rcvd: 108
Host 221.141.254.254.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 221.141.254.254.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 121.229.51.1 | attackspam | SSH brute-force: detected 18 distinct usernames within a 24-hour window. |
2020-04-09 16:02:36 |
| 221.232.224.75 | attack | 2020-04-09T09:19:58.177139rocketchat.forhosting.nl sshd[15383]: Invalid user musikbot from 221.232.224.75 port 48009 2020-04-09T09:20:00.778520rocketchat.forhosting.nl sshd[15383]: Failed password for invalid user musikbot from 221.232.224.75 port 48009 ssh2 2020-04-09T09:44:17.175239rocketchat.forhosting.nl sshd[16063]: Invalid user admin from 221.232.224.75 port 55709 ... |
2020-04-09 15:56:13 |
| 82.64.162.13 | attackspam | Apr 9 05:53:16 markkoudstaal sshd[8391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.162.13 Apr 9 05:53:16 markkoudstaal sshd[8390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.162.13 Apr 9 05:53:18 markkoudstaal sshd[8391]: Failed password for invalid user pi from 82.64.162.13 port 48032 ssh2 Apr 9 05:53:18 markkoudstaal sshd[8390]: Failed password for invalid user pi from 82.64.162.13 port 48030 ssh2 |
2020-04-09 15:41:21 |
| 201.249.169.210 | attack | $lgm |
2020-04-09 16:05:08 |
| 118.27.9.229 | attackbotsspam | Apr 9 09:13:54 cvbnet sshd[11982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.9.229 Apr 9 09:13:56 cvbnet sshd[11982]: Failed password for invalid user ts3bot2 from 118.27.9.229 port 55898 ssh2 ... |
2020-04-09 16:00:32 |
| 8.209.73.223 | attackbots | Apr 8 13:38:44 server sshd\[8564\]: Failed password for invalid user jimmy from 8.209.73.223 port 41054 ssh2 Apr 9 07:07:17 server sshd\[17151\]: Invalid user test from 8.209.73.223 Apr 9 07:07:17 server sshd\[17151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.209.73.223 Apr 9 07:07:20 server sshd\[17151\]: Failed password for invalid user test from 8.209.73.223 port 48696 ssh2 Apr 9 07:13:28 server sshd\[18508\]: Invalid user test from 8.209.73.223 Apr 9 07:13:28 server sshd\[18508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.209.73.223 ... |
2020-04-09 15:36:04 |
| 111.229.126.37 | attackspam | SSH login attempts. |
2020-04-09 15:45:12 |
| 103.76.201.118 | attackbots | (From taylor.buchanan@gmail.com) Hello n95 masks directly from our factory in U.S.A. We have large stocks. Order here https://screenshot.photos/n95masks2 Sincerely "Sent from my Samsung" |
2020-04-09 15:29:03 |
| 162.209.246.125 | attackbotsspam | Apr 9 04:33:18 game-panel sshd[14418]: Failed password for mysql from 162.209.246.125 port 51338 ssh2 Apr 9 04:41:03 game-panel sshd[14719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.209.246.125 Apr 9 04:41:04 game-panel sshd[14719]: Failed password for invalid user test from 162.209.246.125 port 58960 ssh2 |
2020-04-09 15:26:20 |
| 222.186.175.183 | attack | Apr 9 14:58:43 webhost01 sshd[20476]: Failed password for root from 222.186.175.183 port 24064 ssh2 Apr 9 14:58:55 webhost01 sshd[20476]: error: maximum authentication attempts exceeded for root from 222.186.175.183 port 24064 ssh2 [preauth] ... |
2020-04-09 15:59:32 |
| 181.222.48.86 | attack | detected by Fail2Ban |
2020-04-09 15:44:35 |
| 181.40.73.86 | attackbots | Apr 9 12:49:09 itv-usvr-02 sshd[17243]: Invalid user fctr from 181.40.73.86 port 47036 Apr 9 12:49:09 itv-usvr-02 sshd[17243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.73.86 Apr 9 12:49:09 itv-usvr-02 sshd[17243]: Invalid user fctr from 181.40.73.86 port 47036 Apr 9 12:49:11 itv-usvr-02 sshd[17243]: Failed password for invalid user fctr from 181.40.73.86 port 47036 ssh2 Apr 9 12:53:30 itv-usvr-02 sshd[17369]: Invalid user kafka from 181.40.73.86 port 3359 |
2020-04-09 15:33:05 |
| 106.13.165.164 | attackspam | 5x Failed Password |
2020-04-09 16:01:32 |
| 139.99.84.85 | attackbotsspam | Apr 9 09:00:32 host sshd[42945]: Invalid user admin from 139.99.84.85 port 43662 ... |
2020-04-09 16:10:49 |
| 85.209.0.246 | attackspam | Automatic report - Port Scan |
2020-04-09 15:40:47 |