City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.14.193.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;67.14.193.16.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 02:03:19 CST 2025
;; MSG SIZE  rcvd: 10516.193.14.67.in-addr.arpa domain name pointer 67-14-193-16.static.sat-co.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
16.193.14.67.in-addr.arpa	name = 67-14-193-16.static.sat-co.net.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 171.239.254.206 | attack | Invalid user service from 171.239.254.206 port 11520 | 2019-10-25 02:43:54 | 
| 61.92.14.168 | attackbots | Invalid user zimbra from 61.92.14.168 port 60782 | 2019-10-25 03:02:50 | 
| 82.165.35.17 | attackspam | Invalid user zimbra from 82.165.35.17 port 33586 | 2019-10-25 02:59:00 | 
| 103.126.172.6 | attack | Oct 24 20:37:32 vps691689 sshd[5976]: Failed password for root from 103.126.172.6 port 34498 ssh2 Oct 24 20:41:46 vps691689 sshd[6065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.126.172.6 ... | 2019-10-25 02:56:46 | 
| 139.199.248.153 | attackbotsspam | Oct 24 17:46:09 cp sshd[20953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.153 | 2019-10-25 02:48:36 | 
| 101.251.68.167 | attackbots | Invalid user admin from 101.251.68.167 port 57643 | 2019-10-25 02:57:12 | 
| 117.66.243.77 | attack | 2019-10-24T18:39:12.472067abusebot-7.cloudsearch.cf sshd\[15348\]: Invalid user reception from 117.66.243.77 port 40404 | 2019-10-25 02:52:55 | 
| 183.56.212.215 | attackspambots | Oct 24 11:48:10 firewall sshd[6526]: Invalid user 123 from 183.56.212.215 Oct 24 11:48:13 firewall sshd[6526]: Failed password for invalid user 123 from 183.56.212.215 port 39592 ssh2 Oct 24 11:53:46 firewall sshd[6630]: Invalid user Bacon@2017 from 183.56.212.215 ... | 2019-10-25 02:38:15 | 
| 188.247.65.179 | attackspambots | Invalid user jboss from 188.247.65.179 port 57496 | 2019-10-25 02:36:33 | 
| 164.8.132.62 | attack | Invalid user jboss from 164.8.132.62 port 9562 | 2019-10-25 02:44:40 | 
| 36.155.115.137 | attackspam | Invalid user temp from 36.155.115.137 port 33123 | 2019-10-25 02:26:29 | 
| 42.200.66.164 | attack | Oct 24 08:05:21 friendsofhawaii sshd\[23922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-66-164.static.imsbiz.com user=root Oct 24 08:05:23 friendsofhawaii sshd\[23922\]: Failed password for root from 42.200.66.164 port 39906 ssh2 Oct 24 08:12:09 friendsofhawaii sshd\[24576\]: Invalid user admin!\$ from 42.200.66.164 Oct 24 08:12:09 friendsofhawaii sshd\[24576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-66-164.static.imsbiz.com Oct 24 08:12:11 friendsofhawaii sshd\[24576\]: Failed password for invalid user admin!\$ from 42.200.66.164 port 50768 ssh2 | 2019-10-25 02:24:28 | 
| 222.252.25.241 | attackbots | Invalid user nagios from 222.252.25.241 port 58270 | 2019-10-25 02:29:47 | 
| 156.212.49.94 | attackspam | Invalid user admin from 156.212.49.94 port 59934 | 2019-10-25 02:45:47 | 
| 59.17.83.93 | attack | Oct 24 19:56:55 odroid64 sshd\[14375\]: Invalid user admin from 59.17.83.93 Oct 24 19:56:55 odroid64 sshd\[14375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.17.83.93 ... | 2019-10-25 02:20:00 |