City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.44.136.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64181
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.44.136.214. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 19:23:18 CST 2025
;; MSG SIZE rcvd: 106
214.136.44.66.in-addr.arpa domain name pointer dynamic-66-44-136-214.nuveramail.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
214.136.44.66.in-addr.arpa name = dynamic-66-44-136-214.nuveramail.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 146.185.157.31 | attackbots | firewall-block, port(s): 2519/tcp |
2019-07-18 14:39:49 |
| 72.12.194.90 | attackbotsspam | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-07-18 14:19:04 |
| 139.59.28.61 | attackspambots | Jul 18 08:54:19 v22019058497090703 sshd[21661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.28.61 Jul 18 08:54:22 v22019058497090703 sshd[21661]: Failed password for invalid user ashok from 139.59.28.61 port 56332 ssh2 Jul 18 08:59:38 v22019058497090703 sshd[21992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.28.61 ... |
2019-07-18 15:05:13 |
| 106.12.73.236 | attackbotsspam | Jul 18 01:41:29 aat-srv002 sshd[2286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.73.236 Jul 18 01:41:31 aat-srv002 sshd[2286]: Failed password for invalid user nfsnobody from 106.12.73.236 port 43676 ssh2 Jul 18 01:47:34 aat-srv002 sshd[2378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.73.236 Jul 18 01:47:36 aat-srv002 sshd[2378]: Failed password for invalid user prueba from 106.12.73.236 port 41154 ssh2 ... |
2019-07-18 15:05:41 |
| 164.68.101.155 | attackbots | firewall-block, port(s): 8080/tcp |
2019-07-18 14:32:57 |
| 80.14.72.121 | attack | TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-18 03:19:01] |
2019-07-18 14:49:42 |
| 103.87.85.179 | attack | Trying ports that it shouldn't be. |
2019-07-18 14:31:20 |
| 222.124.146.18 | attackbotsspam | Jul 18 07:36:52 ubuntu-2gb-nbg1-dc3-1 sshd[14382]: Failed password for root from 222.124.146.18 port 35835 ssh2 Jul 18 07:42:34 ubuntu-2gb-nbg1-dc3-1 sshd[14739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.146.18 ... |
2019-07-18 14:34:38 |
| 195.136.205.11 | attack | 20 attempts against mh-ssh on pluto.magehost.pro |
2019-07-18 14:52:45 |
| 49.145.137.129 | attackbots | PHI,WP GET /wp-login.php |
2019-07-18 14:30:28 |
| 158.69.224.11 | attackbots | 158.69.224.11 - - [18/Jul/2019:07:25:24 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 158.69.224.11 - - [18/Jul/2019:07:25:24 +0200] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 158.69.224.11 - - [18/Jul/2019:07:25:24 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 158.69.224.11 - - [18/Jul/2019:07:25:25 +0200] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 158.69.224.11 - - [18/Jul/2019:07:25:25 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 158.69.224.11 - - [18/Jul/2019:07:25:25 +0200] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2019-07-18 15:02:14 |
| 195.154.35.96 | attack | SIP brute force |
2019-07-18 14:20:30 |
| 49.88.112.67 | attackspambots | Jul 15 05:59:51 srv1 sshd[15326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67 user=r.r Jul 15 05:59:53 srv1 sshd[15326]: Failed password for r.r from 49.88.112.67 port 26306 ssh2 Jul 15 06:00:15 srv1 sshd[15326]: Failed password for r.r from 49.88.112.67 port 26306 ssh2 Jul 15 06:00:15 srv1 sshd[15327]: Received disconnect from 49.88.112.67: 11: Jul 15 06:00:15 srv1 sshd[15326]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.67 user=r.r ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=49.88.112.67 |
2019-07-18 14:34:58 |
| 168.194.248.156 | attack | [Aegis] @ 2019-07-18 02:20:35 0100 -> Multiple attempts to send e-mail from invalid/unknown sender domain. |
2019-07-18 14:23:20 |
| 185.234.218.251 | attackbots | Rude login attack (38 tries in 1d) |
2019-07-18 14:17:38 |