City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 55.214.178.170
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32409
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;55.214.178.170. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 18:26:13 CST 2025
;; MSG SIZE rcvd: 107
b'Host 170.178.214.55.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 55.214.178.170.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
132.148.243.21 | attack | Mar 28 22:34:52 host proftpd[8078]: 0.0.0.0 (132.148.243.21[132.148.243.21]) - USER admin@apremex.com: no such user found from 132.148.243.21 [132.148.243.21] to 62.210.151.217:21 ... |
2020-03-29 08:26:46 |
197.205.3.171 | attackbots | trying to access non-authorized port |
2020-03-29 08:23:44 |
154.70.200.102 | attackspam | fail2ban |
2020-03-29 08:11:50 |
150.107.8.44 | attack | Mar 28 22:34:54 debian-2gb-nbg1-2 kernel: \[7690358.767536\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=150.107.8.44 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=19486 PROTO=TCP SPT=58167 DPT=9222 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-29 08:22:32 |
119.4.225.31 | attackspam | Mar 28 23:00:29 mout sshd[29536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.4.225.31 Mar 28 23:00:29 mout sshd[29536]: Invalid user tia from 119.4.225.31 port 34679 Mar 28 23:00:31 mout sshd[29536]: Failed password for invalid user tia from 119.4.225.31 port 34679 ssh2 |
2020-03-29 07:52:53 |
106.12.209.196 | attackspam | $f2bV_matches |
2020-03-29 08:28:40 |
182.61.49.107 | attack | 5x Failed Password |
2020-03-29 08:08:18 |
47.50.246.114 | attack | (sshd) Failed SSH login from 47.50.246.114 (US/United States/047-050-246-114.biz.spectrum.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 28 22:31:06 elude sshd[2169]: Invalid user xmm from 47.50.246.114 port 52056 Mar 28 22:31:08 elude sshd[2169]: Failed password for invalid user xmm from 47.50.246.114 port 52056 ssh2 Mar 28 22:36:04 elude sshd[2395]: Invalid user ym from 47.50.246.114 port 46732 Mar 28 22:36:06 elude sshd[2395]: Failed password for invalid user ym from 47.50.246.114 port 46732 ssh2 Mar 28 22:40:15 elude sshd[2673]: Invalid user aht from 47.50.246.114 port 58828 |
2020-03-29 08:29:34 |
1.53.179.93 | attackspam | 23/tcp 23/tcp 23/tcp... [2020-03-28]7pkt,1pt.(tcp) |
2020-03-29 08:23:27 |
118.24.14.18 | attackbotsspam | Mar 29 00:19:53 pornomens sshd\[23174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.14.18 user=root Mar 29 00:19:55 pornomens sshd\[23174\]: Failed password for root from 118.24.14.18 port 55448 ssh2 Mar 29 00:24:17 pornomens sshd\[23229\]: Invalid user usuario from 118.24.14.18 port 47464 Mar 29 00:24:17 pornomens sshd\[23229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.14.18 ... |
2020-03-29 08:19:19 |
14.116.195.173 | attackspambots | Invalid user linqj from 14.116.195.173 port 47456 |
2020-03-29 08:09:59 |
60.249.230.218 | attack | W 31101,/var/log/nginx/access.log,-,- |
2020-03-29 07:56:56 |
14.29.246.48 | attackspam | Invalid user jolan from 14.29.246.48 port 45703 |
2020-03-29 08:00:11 |
181.129.161.28 | attack | Mar 29 00:07:01 ip-172-31-62-245 sshd\[23907\]: Invalid user eqn from 181.129.161.28\ Mar 29 00:07:03 ip-172-31-62-245 sshd\[23907\]: Failed password for invalid user eqn from 181.129.161.28 port 44000 ssh2\ Mar 29 00:11:10 ip-172-31-62-245 sshd\[24021\]: Invalid user jwv from 181.129.161.28\ Mar 29 00:11:12 ip-172-31-62-245 sshd\[24021\]: Failed password for invalid user jwv from 181.129.161.28 port 56608 ssh2\ Mar 29 00:15:30 ip-172-31-62-245 sshd\[24074\]: Invalid user teamspeak3 from 181.129.161.28\ |
2020-03-29 08:20:07 |
93.171.31.128 | attack | 445/tcp [2020-03-28]1pkt |
2020-03-29 07:59:51 |