City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.214.66.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.214.66.2.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024123001 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 31 09:40:41 CST 2024
;; MSG SIZE  rcvd: 104Host 2.66.214.64.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 2.66.214.64.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 4.16.61.171 | attackbots | Failed password for invalid user sad from 4.16.61.171 port 38650 ssh2 | 2020-06-13 02:41:30 | 
| 36.89.156.141 | attackspam | Jun 12 14:22:06 r.ca sshd[2176]: Failed password for invalid user oracle from 36.89.156.141 port 49850 ssh2 | 2020-06-13 03:19:04 | 
| 111.200.197.82 | attackspam | Jun 12 20:38:59 buvik sshd[9250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.200.197.82 Jun 12 20:39:02 buvik sshd[9250]: Failed password for invalid user sanyi from 111.200.197.82 port 4451 ssh2 Jun 12 20:39:50 buvik sshd[9484]: Invalid user admin from 111.200.197.82 ... | 2020-06-13 03:14:19 | 
| 92.222.78.178 | attackbotsspam | Jun 12 22:46:38 gw1 sshd[27565]: Failed password for root from 92.222.78.178 port 40120 ssh2 ... | 2020-06-13 03:09:58 | 
| 213.55.2.212 | attackbotsspam | Jun 12 20:01:14 lnxweb62 sshd[15819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.55.2.212 | 2020-06-13 03:02:51 | 
| 106.12.56.41 | attackspambots | 2020-06-12T18:47:14+0200 Failed SSH Authentication/Brute Force Attack. (Server 5) | 2020-06-13 02:39:55 | 
| 217.159.177.222 | attackspambots | Attempts against non-existent wp-login | 2020-06-13 02:58:25 | 
| 187.189.51.117 | attackspam | Jun 12 20:34:46 haigwepa sshd[7719]: Failed password for root from 187.189.51.117 port 11989 ssh2 ... | 2020-06-13 02:58:53 | 
| 138.68.21.125 | attackspambots | Jun 12 20:37:59 piServer sshd[21252]: Failed password for root from 138.68.21.125 port 56042 ssh2 Jun 12 20:42:04 piServer sshd[21707]: Failed password for root from 138.68.21.125 port 57158 ssh2 ... | 2020-06-13 03:03:10 | 
| 46.38.145.249 | attackbotsspam | Jun 12 20:08:21 blackbee postfix/smtpd\[30586\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: authentication failure Jun 12 20:10:01 blackbee postfix/smtpd\[30658\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: authentication failure Jun 12 20:11:36 blackbee postfix/smtpd\[30586\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: authentication failure Jun 12 20:13:10 blackbee postfix/smtpd\[30586\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: authentication failure Jun 12 20:14:44 blackbee postfix/smtpd\[30586\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: authentication failure ... | 2020-06-13 03:16:10 | 
| 134.209.176.160 | attack | [ssh] SSH attack | 2020-06-13 02:48:37 | 
| 45.119.81.99 | attackspam | Jun 12 12:46:29 Tower sshd[43320]: Connection from 45.119.81.99 port 41332 on 192.168.10.220 port 22 rdomain "" Jun 12 12:46:32 Tower sshd[43320]: Failed password for root from 45.119.81.99 port 41332 ssh2 Jun 12 12:46:32 Tower sshd[43320]: Received disconnect from 45.119.81.99 port 41332:11: Bye Bye [preauth] Jun 12 12:46:32 Tower sshd[43320]: Disconnected from authenticating user root 45.119.81.99 port 41332 [preauth] | 2020-06-13 02:50:08 | 
| 49.234.96.210 | attack | Jun 12 12:07:24 dignus sshd[6106]: Invalid user packer from 49.234.96.210 port 52182 Jun 12 12:07:24 dignus sshd[6106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.96.210 Jun 12 12:07:26 dignus sshd[6106]: Failed password for invalid user packer from 49.234.96.210 port 52182 ssh2 Jun 12 12:09:25 dignus sshd[6289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.96.210 user=root Jun 12 12:09:28 dignus sshd[6289]: Failed password for root from 49.234.96.210 port 46418 ssh2 ... | 2020-06-13 03:17:41 | 
| 219.84.236.108 | attack | Fail2Ban Ban Triggered (2) | 2020-06-13 02:45:08 | 
| 51.75.126.115 | attackspam | Jun 12 18:44:58 minden010 sshd[9967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.126.115 Jun 12 18:45:00 minden010 sshd[9967]: Failed password for invalid user monitor from 51.75.126.115 port 52148 ssh2 Jun 12 18:46:17 minden010 sshd[11004]: Failed password for root from 51.75.126.115 port 44660 ssh2 ... | 2020-06-13 03:11:30 |