City: unknown
Region: unknown
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.21.250.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;82.21.250.54. IN A
;; AUTHORITY SECTION:
. 485 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 08:55:50 CST 2022
;; MSG SIZE rcvd: 105
54.250.21.82.in-addr.arpa domain name pointer cpc119922-nrwh13-2-0-cust53.4-4.cable.virginm.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
54.250.21.82.in-addr.arpa name = cpc119922-nrwh13-2-0-cust53.4-4.cable.virginm.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
115.63.55.240 | attackbots | Attempted connection to port 34491. |
2020-04-02 22:32:33 |
27.155.83.174 | attackspam | Apr 2 08:46:11 mail sshd\[933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.155.83.174 user=root ... |
2020-04-02 23:20:24 |
104.110.75.76 | attackbots | Attempted connection to port 24119. |
2020-04-02 23:07:08 |
171.240.181.23 | attackbotsspam | Unauthorized connection attempt from IP address 171.240.181.23 on Port 445(SMB) |
2020-04-02 23:04:43 |
138.197.131.249 | attack | 2020-04-02T12:38:18.127173shield sshd\[2241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=secure.canadahomestayinternational.com user=root 2020-04-02T12:38:19.318033shield sshd\[2241\]: Failed password for root from 138.197.131.249 port 55408 ssh2 2020-04-02T12:42:26.538319shield sshd\[3500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=secure.canadahomestayinternational.com user=root 2020-04-02T12:42:29.445367shield sshd\[3500\]: Failed password for root from 138.197.131.249 port 39960 ssh2 2020-04-02T12:46:35.020706shield sshd\[4527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=secure.canadahomestayinternational.com user=root |
2020-04-02 22:40:17 |
1.173.45.243 | attackbotsspam | Attempted connection to port 23. |
2020-04-02 23:15:11 |
159.89.164.199 | attack | serveres are UTC Lines containing failures of 159.89.164.199 Mar 31 20:07:01 tux2 sshd[19537]: Failed password for r.r from 159.89.164.199 port 34988 ssh2 Mar 31 20:07:01 tux2 sshd[19537]: Received disconnect from 159.89.164.199 port 34988:11: Bye Bye [preauth] Mar 31 20:07:01 tux2 sshd[19537]: Disconnected from authenticating user r.r 159.89.164.199 port 34988 [preauth] Mar 31 20:21:51 tux2 sshd[20566]: Invalid user tc from 159.89.164.199 port 35118 Mar 31 20:21:51 tux2 sshd[20566]: Failed password for invalid user tc from 159.89.164.199 port 35118 ssh2 Mar 31 20:21:51 tux2 sshd[20566]: Received disconnect from 159.89.164.199 port 35118:11: Bye Bye [preauth] Mar 31 20:21:51 tux2 sshd[20566]: Disconnected from invalid user tc 159.89.164.199 port 35118 [preauth] Mar 31 20:26:41 tux2 sshd[20913]: Failed password for r.r from 159.89.164.199 port 57000 ssh2 Mar 31 20:26:41 tux2 sshd[20913]: Received disconnect from 159.89.164.199 port 57000:11: Bye Bye [preauth] Mar 31 20:2........ ------------------------------ |
2020-04-02 22:41:55 |
24.185.47.170 | attack | Apr 2 16:46:55 ns3164893 sshd[16946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.185.47.170 user=root Apr 2 16:46:57 ns3164893 sshd[16946]: Failed password for root from 24.185.47.170 port 46658 ssh2 ... |
2020-04-02 23:01:39 |
114.67.82.150 | attackbotsspam | Apr 2 16:37:45 |
2020-04-02 23:30:26 |
138.99.7.54 | attackbots | Apr 2 07:05:32 server1 sshd\[27542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.99.7.54 user=root Apr 2 07:05:34 server1 sshd\[27542\]: Failed password for root from 138.99.7.54 port 46016 ssh2 Apr 2 07:07:41 server1 sshd\[28230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.99.7.54 user=root Apr 2 07:07:43 server1 sshd\[28230\]: Failed password for root from 138.99.7.54 port 45624 ssh2 Apr 2 07:09:53 server1 sshd\[28906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.99.7.54 user=root ... |
2020-04-02 23:29:47 |
201.49.127.212 | attackspambots | Apr 2 15:50:14 |
2020-04-02 22:38:17 |
144.76.216.4 | attack | Apr 2 14:02:36 vlre-nyc-1 sshd\[12779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.76.216.4 user=root Apr 2 14:02:38 vlre-nyc-1 sshd\[12779\]: Failed password for root from 144.76.216.4 port 46464 ssh2 Apr 2 14:06:30 vlre-nyc-1 sshd\[12848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.76.216.4 user=root Apr 2 14:06:32 vlre-nyc-1 sshd\[12848\]: Failed password for root from 144.76.216.4 port 58194 ssh2 Apr 2 14:10:23 vlre-nyc-1 sshd\[12923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.76.216.4 user=root ... |
2020-04-02 23:03:33 |
157.42.215.198 | attackspam | Unauthorized connection attempt from IP address 157.42.215.198 on Port 445(SMB) |
2020-04-02 23:13:29 |
103.127.224.153 | attackbots | Unauthorized connection attempt from IP address 103.127.224.153 on Port 445(SMB) |
2020-04-02 23:30:58 |
107.189.164.60 | attackspambots | Attempted connection to port 3137. |
2020-04-02 22:42:16 |