City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.58.21.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7450
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.58.21.94. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 05:21:57 CST 2025
;; MSG SIZE rcvd: 104
Host 94.21.58.50.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 94.21.58.50.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 167.99.99.10 | attackspambots | SSH/22 MH Probe, BF, Hack - |
2020-03-07 00:36:15 |
| 206.189.229.112 | attack | Mar 6 14:21:38 hcbbdb sshd\[19324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.229.112 user=root Mar 6 14:21:40 hcbbdb sshd\[19324\]: Failed password for root from 206.189.229.112 port 43118 ssh2 Mar 6 14:25:47 hcbbdb sshd\[19794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.229.112 user=root Mar 6 14:25:48 hcbbdb sshd\[19794\]: Failed password for root from 206.189.229.112 port 59574 ssh2 Mar 6 14:30:07 hcbbdb sshd\[20295\]: Invalid user tomcat from 206.189.229.112 Mar 6 14:30:07 hcbbdb sshd\[20295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.229.112 |
2020-03-07 00:03:12 |
| 59.173.44.75 | attackspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-03-07 00:20:09 |
| 78.186.19.225 | attackspam | Unauthorized connection attempt from IP address 78.186.19.225 on Port 445(SMB) |
2020-03-07 00:30:33 |
| 108.249.250.174 | attack | Scan detected and blocked 2020.03.06 14:31:58 |
2020-03-07 00:08:51 |
| 122.51.216.203 | attackbotsspam | Mar 6 15:48:40 mailserver sshd\[27301\]: Invalid user install from 122.51.216.203 ... |
2020-03-06 23:59:48 |
| 190.97.238.2 | attack | Automatic report - Port Scan Attack |
2020-03-07 00:39:26 |
| 125.161.128.79 | attackspam | Unauthorized connection attempt from IP address 125.161.128.79 on Port 445(SMB) |
2020-03-07 00:08:16 |
| 103.136.24.50 | attackbotsspam | Unauthorized connection attempt from IP address 103.136.24.50 on Port 445(SMB) |
2020-03-07 00:13:04 |
| 222.186.190.92 | attackspambots | Mar 6 16:46:41 Ubuntu-1404-trusty-64-minimal sshd\[25670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92 user=root Mar 6 16:46:43 Ubuntu-1404-trusty-64-minimal sshd\[25670\]: Failed password for root from 222.186.190.92 port 25472 ssh2 Mar 6 16:47:02 Ubuntu-1404-trusty-64-minimal sshd\[26010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92 user=root Mar 6 16:47:04 Ubuntu-1404-trusty-64-minimal sshd\[26010\]: Failed password for root from 222.186.190.92 port 24382 ssh2 Mar 6 16:47:22 Ubuntu-1404-trusty-64-minimal sshd\[26162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92 user=root |
2020-03-06 23:56:12 |
| 201.46.21.11 | attack | Unauthorized connection attempt from IP address 201.46.21.11 on Port 445(SMB) |
2020-03-07 00:33:11 |
| 195.98.69.244 | attack | Mar 6 14:31:47 grey postfix/smtpd\[23651\]: NOQUEUE: reject: RCPT from unknown\[195.98.69.244\]: 554 5.7.1 Service unavailable\; Client host \[195.98.69.244\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?195.98.69.244\; from=\ |
2020-03-07 00:17:19 |
| 213.230.95.241 | attack | Automatic report - Port Scan Attack |
2020-03-07 00:22:05 |
| 51.68.89.100 | attackbots | Mar 6 16:40:18 mout sshd[2808]: Invalid user oracle from 51.68.89.100 port 58554 |
2020-03-06 23:55:33 |
| 212.75.214.90 | attackspambots | Unauthorized connection attempt from IP address 212.75.214.90 on Port 445(SMB) |
2020-03-07 00:21:10 |