City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.21.250.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20531
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;54.21.250.74.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 19:07:26 CST 2025
;; MSG SIZE  rcvd: 105Host 74.250.21.54.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 74.250.21.54.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 189.112.90.132 | attackspam | SSH_scan | 2020-08-23 16:11:43 | 
| 182.254.145.29 | attackspam | 21 attempts against mh-ssh on cloud | 2020-08-23 16:20:31 | 
| 162.243.128.18 | attackbots | firewall-block, port(s): 8181/tcp | 2020-08-23 16:33:39 | 
| 138.121.170.194 | attackspam | Fail2Ban Ban Triggered (2) | 2020-08-23 16:37:37 | 
| 36.81.203.211 | attack | Aug 23 08:25:20 abendstille sshd\[22767\]: Invalid user stp from 36.81.203.211 Aug 23 08:25:20 abendstille sshd\[22767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.81.203.211 Aug 23 08:25:22 abendstille sshd\[22767\]: Failed password for invalid user stp from 36.81.203.211 port 51328 ssh2 Aug 23 08:30:15 abendstille sshd\[27770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.81.203.211 user=root Aug 23 08:30:18 abendstille sshd\[27770\]: Failed password for root from 36.81.203.211 port 51908 ssh2 ... | 2020-08-23 16:07:57 | 
| 200.60.60.84 | attackspambots | Aug 23 09:11:20 rancher-0 sshd[1227761]: Invalid user sandbox from 200.60.60.84 port 40295 Aug 23 09:11:22 rancher-0 sshd[1227761]: Failed password for invalid user sandbox from 200.60.60.84 port 40295 ssh2 ... | 2020-08-23 16:09:20 | 
| 144.217.42.212 | attackbotsspam | Aug 23 09:58:56 home sshd[3616384]: Failed password for invalid user sp from 144.217.42.212 port 41665 ssh2 Aug 23 10:02:35 home sshd[3617653]: Invalid user temp from 144.217.42.212 port 44574 Aug 23 10:02:35 home sshd[3617653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.42.212 Aug 23 10:02:35 home sshd[3617653]: Invalid user temp from 144.217.42.212 port 44574 Aug 23 10:02:37 home sshd[3617653]: Failed password for invalid user temp from 144.217.42.212 port 44574 ssh2 ... | 2020-08-23 16:13:11 | 
| 218.107.214.10 | attackspambots | Email rejected due to spam filtering | 2020-08-23 16:21:54 | 
| 45.119.82.251 | attackbotsspam | Failed password for invalid user jack from 45.119.82.251 port 44916 ssh2 | 2020-08-23 16:09:44 | 
| 85.206.162.212 | attack | 0,31-18/12 [bc10/m123] PostRequest-Spammer scoring: zurich | 2020-08-23 16:41:05 | 
| 81.17.80.162 | attackspam | SMB Server BruteForce Attack | 2020-08-23 16:44:03 | 
| 47.8.224.115 | attackbotsspam | AbusiveCrawling | 2020-08-23 16:10:41 | 
| 222.186.173.238 | attack | Aug 23 10:09:14 theomazars sshd[31250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238 user=root Aug 23 10:09:16 theomazars sshd[31250]: Failed password for root from 222.186.173.238 port 48782 ssh2 | 2020-08-23 16:10:22 | 
| 192.241.202.169 | attackspam | 2020-08-23T15:17:19.111494hostname sshd[97338]: Invalid user ff from 192.241.202.169 port 51856 ... | 2020-08-23 16:25:20 | 
| 118.24.123.136 | attack | k+ssh-bruteforce | 2020-08-23 16:21:19 |