City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.34.214.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46548
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;71.34.214.113. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 13:42:40 CST 2025
;; MSG SIZE rcvd: 106
113.214.34.71.in-addr.arpa domain name pointer 71-34-214-113.ksca.qwest.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
113.214.34.71.in-addr.arpa name = 71-34-214-113.ksca.qwest.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
104.244.75.97 | attackbotsspam | fire |
2019-11-17 02:17:59 |
222.184.232.220 | attackbots | firewall-block, port(s): 1433/tcp |
2019-11-17 01:57:40 |
195.16.41.170 | attack | Automatic report - Banned IP Access |
2019-11-17 02:19:07 |
157.245.73.144 | attackspam | Nov 16 17:43:46 game-panel sshd[24106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.73.144 Nov 16 17:43:49 game-panel sshd[24106]: Failed password for invalid user xbmc from 157.245.73.144 port 43762 ssh2 Nov 16 17:52:05 game-panel sshd[24303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.73.144 |
2019-11-17 02:03:21 |
117.240.186.218 | attackspam | 445/tcp [2019-11-16]1pkt |
2019-11-17 02:17:02 |
191.37.227.229 | attackbots | Telnet/23 MH Probe, BF, Hack - |
2019-11-17 02:05:07 |
148.70.4.242 | attackspambots | Nov 16 17:26:02 sauna sshd[38007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.4.242 Nov 16 17:26:04 sauna sshd[38007]: Failed password for invalid user mertz from 148.70.4.242 port 40682 ssh2 ... |
2019-11-17 02:09:48 |
173.177.141.211 | attackspambots | 23/tcp [2019-11-16]1pkt |
2019-11-17 02:00:48 |
117.40.255.197 | attackspambots | fire |
2019-11-17 01:42:44 |
104.248.95.188 | attackbots | fire |
2019-11-17 02:12:35 |
41.222.196.57 | attackbots | Brute-force attempt banned |
2019-11-17 02:04:20 |
222.186.173.215 | attackbots | Nov 16 18:55:54 sd-53420 sshd\[29805\]: User root from 222.186.173.215 not allowed because none of user's groups are listed in AllowGroups Nov 16 18:55:54 sd-53420 sshd\[29805\]: Failed none for invalid user root from 222.186.173.215 port 18916 ssh2 Nov 16 18:55:54 sd-53420 sshd\[29805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215 user=root Nov 16 18:55:55 sd-53420 sshd\[29805\]: Failed password for invalid user root from 222.186.173.215 port 18916 ssh2 Nov 16 18:56:12 sd-53420 sshd\[29882\]: User root from 222.186.173.215 not allowed because none of user's groups are listed in AllowGroups ... |
2019-11-17 01:57:12 |
12.10.12.179 | attackspambots | fire |
2019-11-17 01:42:11 |
104.248.145.18 | attackspambots | fire |
2019-11-17 02:17:30 |
110.235.192.100 | attack | 445/tcp [2019-11-16]1pkt |
2019-11-17 01:56:27 |