City: San Jose
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.14.254.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64336
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;38.14.254.216. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025082301 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 24 02:50:57 CST 2025
;; MSG SIZE rcvd: 106
Host 216.254.14.38.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 216.254.14.38.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
200.11.219.206 | attackspambots | Feb 17 16:18:30 vtv3 sshd\[7559\]: Invalid user testuser from 200.11.219.206 port 36555 Feb 17 16:18:30 vtv3 sshd\[7559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.11.219.206 Feb 17 16:18:33 vtv3 sshd\[7559\]: Failed password for invalid user testuser from 200.11.219.206 port 36555 ssh2 Feb 17 16:24:24 vtv3 sshd\[9097\]: Invalid user teamspeak7 from 200.11.219.206 port 53105 Feb 17 16:24:24 vtv3 sshd\[9097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.11.219.206 Feb 19 03:11:34 vtv3 sshd\[9328\]: Invalid user gitlab-runner from 200.11.219.206 port 23802 Feb 19 03:11:34 vtv3 sshd\[9328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.11.219.206 Feb 19 03:11:37 vtv3 sshd\[9328\]: Failed password for invalid user gitlab-runner from 200.11.219.206 port 23802 ssh2 Feb 19 03:21:08 vtv3 sshd\[12139\]: Invalid user ubuntu from 200.11.219.206 port 20679 Feb 19 03:21 |
2019-09-13 04:22:32 |
106.13.6.116 | attackbots | Sep 12 21:39:20 mail sshd\[23942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116 Sep 12 21:39:22 mail sshd\[23942\]: Failed password for invalid user system from 106.13.6.116 port 35970 ssh2 Sep 12 21:43:56 mail sshd\[24326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116 user=nagios Sep 12 21:43:58 mail sshd\[24326\]: Failed password for nagios from 106.13.6.116 port 52772 ssh2 Sep 12 21:48:33 mail sshd\[24751\]: Invalid user ubuntu from 106.13.6.116 port 42266 |
2019-09-13 03:59:32 |
46.105.31.249 | attack | Sep 12 21:14:01 SilenceServices sshd[28074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.31.249 Sep 12 21:14:04 SilenceServices sshd[28074]: Failed password for invalid user dspace from 46.105.31.249 port 42526 ssh2 Sep 12 21:19:08 SilenceServices sshd[29991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.31.249 |
2019-09-13 04:28:33 |
202.120.40.69 | attackbots | Sep 12 15:29:40 TORMINT sshd\[21215\]: Invalid user guest from 202.120.40.69 Sep 12 15:29:40 TORMINT sshd\[21215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.40.69 Sep 12 15:29:42 TORMINT sshd\[21215\]: Failed password for invalid user guest from 202.120.40.69 port 54342 ssh2 ... |
2019-09-13 04:02:36 |
209.126.230.74 | attackbots | firewall-block, port(s): 794/tcp, 1154/tcp, 14281/tcp, 16256/tcp, 39446/tcp, 54290/tcp, 61500/tcp |
2019-09-13 04:48:57 |
104.248.58.71 | attack | $f2bV_matches |
2019-09-13 04:34:04 |
51.68.82.218 | attack | Sep 12 19:23:23 MK-Soft-VM4 sshd\[18008\]: Invalid user accounts from 51.68.82.218 port 44370 Sep 12 19:23:23 MK-Soft-VM4 sshd\[18008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.82.218 Sep 12 19:23:26 MK-Soft-VM4 sshd\[18008\]: Failed password for invalid user accounts from 51.68.82.218 port 44370 ssh2 ... |
2019-09-13 04:07:19 |
178.62.23.108 | attackbotsspam | $f2bV_matches |
2019-09-13 04:11:40 |
213.167.46.166 | attackspam | Sep 12 09:38:18 php1 sshd\[24940\]: Invalid user 1 from 213.167.46.166 Sep 12 09:38:18 php1 sshd\[24940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.167.46.166 Sep 12 09:38:20 php1 sshd\[24940\]: Failed password for invalid user 1 from 213.167.46.166 port 34682 ssh2 Sep 12 09:45:09 php1 sshd\[25935\]: Invalid user baptiste from 213.167.46.166 Sep 12 09:45:09 php1 sshd\[25935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.167.46.166 |
2019-09-13 04:01:52 |
178.217.173.54 | attackbots | $f2bV_matches_ltvn |
2019-09-13 04:09:35 |
51.75.32.141 | attackspam | Sep 12 09:55:32 web1 sshd\[19535\]: Invalid user webapps from 51.75.32.141 Sep 12 09:55:32 web1 sshd\[19535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.32.141 Sep 12 09:55:34 web1 sshd\[19535\]: Failed password for invalid user webapps from 51.75.32.141 port 49560 ssh2 Sep 12 10:01:09 web1 sshd\[20035\]: Invalid user 1 from 51.75.32.141 Sep 12 10:01:09 web1 sshd\[20035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.32.141 |
2019-09-13 04:08:52 |
144.217.15.161 | attack | 2019-09-12T16:54:42.651889abusebot-5.cloudsearch.cf sshd\[9030\]: Invalid user ubuntu from 144.217.15.161 port 46086 |
2019-09-13 04:26:07 |
218.92.0.186 | attack | Sep 12 19:51:17 hb sshd\[28087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.186 user=root Sep 12 19:51:18 hb sshd\[28087\]: Failed password for root from 218.92.0.186 port 64142 ssh2 Sep 12 19:51:40 hb sshd\[28108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.186 user=root Sep 12 19:51:43 hb sshd\[28108\]: Failed password for root from 218.92.0.186 port 19444 ssh2 Sep 12 19:51:45 hb sshd\[28108\]: Failed password for root from 218.92.0.186 port 19444 ssh2 |
2019-09-13 04:48:13 |
138.68.27.177 | attack | Sep 12 16:12:57 ny01 sshd[1801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.27.177 Sep 12 16:12:59 ny01 sshd[1801]: Failed password for invalid user insserver from 138.68.27.177 port 40326 ssh2 Sep 12 16:19:10 ny01 sshd[2914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.27.177 |
2019-09-13 04:35:44 |
200.194.54.211 | attackbots | SMB Server BruteForce Attack |
2019-09-13 04:03:00 |