City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.16.2.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15518
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;53.16.2.214. IN A
;; AUTHORITY SECTION:
. 535 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022121200 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 12 18:40:12 CST 2022
;; MSG SIZE rcvd: 104
Host 214.2.16.53.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 214.2.16.53.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.173.238 | attackspambots | Jun 8 08:45:46 abendstille sshd\[24120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238 user=root Jun 8 08:45:49 abendstille sshd\[24120\]: Failed password for root from 222.186.173.238 port 56354 ssh2 Jun 8 08:45:53 abendstille sshd\[24120\]: Failed password for root from 222.186.173.238 port 56354 ssh2 Jun 8 08:45:56 abendstille sshd\[24120\]: Failed password for root from 222.186.173.238 port 56354 ssh2 Jun 8 08:45:59 abendstille sshd\[24120\]: Failed password for root from 222.186.173.238 port 56354 ssh2 ... |
2020-06-08 14:50:33 |
| 137.74.198.126 | attackbots | 2020-06-08T07:12:36.968952vps773228.ovh.net sshd[2314]: Failed password for root from 137.74.198.126 port 51250 ssh2 2020-06-08T07:16:48.233427vps773228.ovh.net sshd[2364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.ip-137-74-198.eu user=root 2020-06-08T07:16:50.236509vps773228.ovh.net sshd[2364]: Failed password for root from 137.74.198.126 port 53634 ssh2 2020-06-08T07:20:54.921628vps773228.ovh.net sshd[2437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.ip-137-74-198.eu user=root 2020-06-08T07:20:57.030266vps773228.ovh.net sshd[2437]: Failed password for root from 137.74.198.126 port 56016 ssh2 ... |
2020-06-08 14:27:44 |
| 101.109.54.98 | attackbots | 1591588365 - 06/08/2020 05:52:45 Host: 101.109.54.98/101.109.54.98 Port: 445 TCP Blocked |
2020-06-08 14:37:08 |
| 198.108.67.17 | attackspambots | Jun 8 09:56:15 debian kernel: [501932.959146] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=198.108.67.17 DST=89.252.131.35 LEN=30 TOS=0x00 PREC=0x00 TTL=36 ID=7698 PROTO=UDP SPT=3230 DPT=5632 LEN=10 |
2020-06-08 14:59:01 |
| 138.117.179.134 | attackbots | Jun 7 18:00:55 php1 sshd\[19826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.117.179.134 user=root Jun 7 18:00:57 php1 sshd\[19826\]: Failed password for root from 138.117.179.134 port 60900 ssh2 Jun 7 18:05:00 php1 sshd\[20354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.117.179.134 user=root Jun 7 18:05:02 php1 sshd\[20354\]: Failed password for root from 138.117.179.134 port 33822 ssh2 Jun 7 18:09:11 php1 sshd\[20924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.117.179.134 user=root |
2020-06-08 15:03:21 |
| 141.98.81.42 | attackspam | Jun 8 08:58:46 vpn01 sshd[769]: Failed password for root from 141.98.81.42 port 15383 ssh2 ... |
2020-06-08 15:00:29 |
| 213.149.171.175 | attackspambots | 1591588335 - 06/08/2020 05:52:15 Host: 213.149.171.175/213.149.171.175 Port: 445 TCP Blocked |
2020-06-08 15:05:34 |
| 137.74.132.175 | attackspambots | 2020-06-08T05:28:59.113280shield sshd\[5847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip175.ip-137-74-132.eu user=root 2020-06-08T05:29:00.803505shield sshd\[5847\]: Failed password for root from 137.74.132.175 port 53844 ssh2 2020-06-08T05:31:53.986823shield sshd\[6874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip175.ip-137-74-132.eu user=root 2020-06-08T05:31:55.891118shield sshd\[6874\]: Failed password for root from 137.74.132.175 port 48860 ssh2 2020-06-08T05:34:44.039905shield sshd\[8041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip175.ip-137-74-132.eu user=root |
2020-06-08 14:54:20 |
| 14.232.210.96 | attackbots | Jun 8 05:44:37 sip sshd[21789]: Failed password for root from 14.232.210.96 port 58660 ssh2 Jun 8 05:48:40 sip sshd[23272]: Failed password for root from 14.232.210.96 port 34840 ssh2 |
2020-06-08 14:41:34 |
| 148.251.92.39 | attackbotsspam | 20 attempts against mh-misbehave-ban on milky |
2020-06-08 14:35:13 |
| 118.25.8.234 | attack | (sshd) Failed SSH login from 118.25.8.234 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 8 06:36:40 s1 sshd[14753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.8.234 user=root Jun 8 06:36:43 s1 sshd[14753]: Failed password for root from 118.25.8.234 port 58870 ssh2 Jun 8 06:47:01 s1 sshd[14998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.8.234 user=root Jun 8 06:47:03 s1 sshd[14998]: Failed password for root from 118.25.8.234 port 47686 ssh2 Jun 8 06:52:06 s1 sshd[15102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.8.234 user=root |
2020-06-08 15:02:50 |
| 222.186.190.14 | attackbotsspam | Jun 8 02:23:19 NPSTNNYC01T sshd[19508]: Failed password for root from 222.186.190.14 port 32735 ssh2 Jun 8 02:23:28 NPSTNNYC01T sshd[19514]: Failed password for root from 222.186.190.14 port 20479 ssh2 ... |
2020-06-08 14:25:21 |
| 222.186.180.17 | attackspambots | Jun 8 08:23:10 abendstille sshd\[1367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17 user=root Jun 8 08:23:12 abendstille sshd\[1367\]: Failed password for root from 222.186.180.17 port 31136 ssh2 Jun 8 08:23:13 abendstille sshd\[1402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17 user=root Jun 8 08:23:14 abendstille sshd\[1402\]: Failed password for root from 222.186.180.17 port 11568 ssh2 Jun 8 08:23:15 abendstille sshd\[1367\]: Failed password for root from 222.186.180.17 port 31136 ssh2 ... |
2020-06-08 14:30:58 |
| 87.251.74.83 | attack | Port scan denied |
2020-06-08 15:01:46 |
| 102.177.145.221 | attackspam | SSH Honeypot -> SSH Bruteforce / Login |
2020-06-08 14:58:45 |