City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.8.21.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31700
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;70.8.21.211. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 22:02:45 CST 2025
;; MSG SIZE rcvd: 104
Host 211.21.8.70.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 211.21.8.70.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 213.158.10.101 | attackspam | $f2bV_matches |
2019-12-20 04:36:46 |
| 81.242.53.21 | attackspambots | Dec 19 16:22:49 server010 sshd[20356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.242.53.21 user=r.r Dec 19 16:22:51 server010 sshd[20356]: Failed password for r.r from 81.242.53.21 port 22303 ssh2 Dec 19 16:28:19 server010 sshd[20596]: Invalid user abdulkaf from 81.242.53.21 Dec 19 16:28:19 server010 sshd[20596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.242.53.21 Dec 19 16:28:21 server010 sshd[20596]: Failed password for invalid user abdulkaf from 81.242.53.21 port 17071 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=81.242.53.21 |
2019-12-20 04:20:18 |
| 115.186.148.38 | attackspam | Dec 19 21:00:47 tux-35-217 sshd\[19612\]: Invalid user selcuk from 115.186.148.38 port 19579 Dec 19 21:00:47 tux-35-217 sshd\[19612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.186.148.38 Dec 19 21:00:49 tux-35-217 sshd\[19612\]: Failed password for invalid user selcuk from 115.186.148.38 port 19579 ssh2 Dec 19 21:06:51 tux-35-217 sshd\[19694\]: Invalid user test from 115.186.148.38 port 25348 Dec 19 21:06:51 tux-35-217 sshd\[19694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.186.148.38 ... |
2019-12-20 04:31:17 |
| 185.156.73.45 | attackspambots | Dec 19 22:59:54 debian-2gb-vpn-nbg1-1 kernel: [1163955.294714] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=185.156.73.45 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=4227 PROTO=TCP SPT=59845 DPT=52995 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-12-20 04:06:13 |
| 101.109.83.140 | attack | SSH Brute Force, server-1 sshd[26108]: Failed password for invalid user porcher from 101.109.83.140 port 52536 ssh2 |
2019-12-20 04:11:53 |
| 24.237.0.92 | attackbots | IMAP |
2019-12-20 04:03:39 |
| 223.25.101.74 | attack | Dec 19 20:04:26 game-panel sshd[13299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.25.101.74 Dec 19 20:04:28 game-panel sshd[13299]: Failed password for invalid user koszuk from 223.25.101.74 port 54348 ssh2 Dec 19 20:10:42 game-panel sshd[13618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.25.101.74 |
2019-12-20 04:35:00 |
| 140.246.58.131 | attackspambots | SSH bruteforce |
2019-12-20 04:30:33 |
| 51.83.41.120 | attackspambots | Dec 19 09:24:49 php1 sshd\[4047\]: Invalid user merlin2000 from 51.83.41.120 Dec 19 09:24:49 php1 sshd\[4047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.ip-51-83-41.eu Dec 19 09:24:50 php1 sshd\[4047\]: Failed password for invalid user merlin2000 from 51.83.41.120 port 40342 ssh2 Dec 19 09:29:42 php1 sshd\[4796\]: Invalid user Lyon from 51.83.41.120 Dec 19 09:29:42 php1 sshd\[4796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.ip-51-83-41.eu |
2019-12-20 04:07:42 |
| 175.138.108.78 | attackspam | Dec 19 05:24:21 auw2 sshd\[22727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.108.78 user=root Dec 19 05:24:23 auw2 sshd\[22727\]: Failed password for root from 175.138.108.78 port 35550 ssh2 Dec 19 05:31:34 auw2 sshd\[23424\]: Invalid user lieuth from 175.138.108.78 Dec 19 05:31:34 auw2 sshd\[23424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.108.78 Dec 19 05:31:36 auw2 sshd\[23424\]: Failed password for invalid user lieuth from 175.138.108.78 port 38956 ssh2 |
2019-12-20 04:05:24 |
| 200.149.231.50 | attackbots | Invalid user guest from 200.149.231.50 port 58022 |
2019-12-20 04:21:07 |
| 38.240.3.21 | attack | Dec 19 18:47:17 web8 sshd\[14188\]: Invalid user webmaster from 38.240.3.21 Dec 19 18:47:17 web8 sshd\[14188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.240.3.21 Dec 19 18:47:18 web8 sshd\[14188\]: Failed password for invalid user webmaster from 38.240.3.21 port 32782 ssh2 Dec 19 18:52:30 web8 sshd\[16600\]: Invalid user admin from 38.240.3.21 Dec 19 18:52:30 web8 sshd\[16600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.240.3.21 |
2019-12-20 04:02:23 |
| 101.51.217.191 | attackbots | 1576765971 - 12/19/2019 15:32:51 Host: 101.51.217.191/101.51.217.191 Port: 445 TCP Blocked |
2019-12-20 04:36:07 |
| 106.75.103.35 | attack | Dec 6 10:13:37 localhost sshd\[12634\]: Invalid user zori from 106.75.103.35 port 35254 Dec 6 10:13:37 localhost sshd\[12634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.103.35 Dec 6 10:13:39 localhost sshd\[12634\]: Failed password for invalid user zori from 106.75.103.35 port 35254 ssh2 Dec 6 10:21:09 localhost sshd\[12696\]: Invalid user ms from 106.75.103.35 port 38572 |
2019-12-20 04:17:15 |
| 212.64.100.229 | attackspambots | Dec 19 19:50:38 *** sshd[32268]: Invalid user wilhelmus from 212.64.100.229 |
2019-12-20 04:27:16 |