City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.14.214.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46971
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;71.14.214.68. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 14:14:28 CST 2022
;; MSG SIZE rcvd: 105
68.214.14.71.in-addr.arpa domain name pointer 071-014-214-068.biz.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
68.214.14.71.in-addr.arpa name = 071-014-214-068.biz.spectrum.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
49.175.181.213 | attack | 2020-06-30T18:13[Censored Hostname] sshd[996]: Failed password for invalid user admin from 49.175.181.213 port 44123 ssh2 2020-06-30T18:13[Censored Hostname] sshd[1022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.175.181.213 user=root 2020-06-30T18:13[Censored Hostname] sshd[1022]: Failed password for root from 49.175.181.213 port 44291 ssh2[...] |
2020-07-02 05:01:29 |
104.236.228.46 | attackbotsspam |
|
2020-07-02 05:00:17 |
80.82.70.140 | attackspam | Firewall Dropped Connection |
2020-07-02 04:46:41 |
190.245.89.184 | attack | Invalid user alex from 190.245.89.184 port 40610 |
2020-07-02 04:44:56 |
139.198.191.217 | attackspam | SSH Invalid Login |
2020-07-02 04:38:50 |
122.116.92.179 | attack | Unauthorized connection attempt from IP address 122.116.92.179 on Port 445(SMB) |
2020-07-02 04:12:35 |
47.88.23.224 | attack | SSH Scan |
2020-07-02 04:16:58 |
218.240.137.68 | attackbotsspam | $f2bV_matches |
2020-07-02 05:12:55 |
159.65.224.137 | attackbots | SSH Invalid Login |
2020-07-02 05:04:31 |
203.205.37.224 | attackbotsspam | Invalid user antena from 203.205.37.224 port 51038 |
2020-07-02 04:17:37 |
106.75.32.229 | attackspam | prod8 ... |
2020-07-02 04:48:44 |
82.100.40.133 | attackspam | (smtpauth) Failed SMTP AUTH login from 82.100.40.133 (CZ/Czechia/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-20 13:49:52 plain authenticator failed for ([82.100.40.133]) [82.100.40.133]: 535 Incorrect authentication data (set_id=r.ahmadi) |
2020-07-02 04:38:08 |
49.235.90.244 | attackspam | Jul 1 00:10:32 server sshd[42002]: Failed password for invalid user vnc from 49.235.90.244 port 53788 ssh2 Jul 1 00:18:32 server sshd[48348]: Failed password for invalid user git from 49.235.90.244 port 55300 ssh2 Jul 1 00:23:41 server sshd[52592]: Failed password for invalid user administrador from 49.235.90.244 port 32874 ssh2 |
2020-07-02 04:25:07 |
140.246.245.144 | attackbots | " " |
2020-07-02 04:41:17 |
86.128.148.151 | attackbotsspam | DATE:2020-06-30 07:00:11, IP:86.128.148.151, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-07-02 04:24:08 |