City: unknown
Region: unknown
Country: Austria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 84.114.163.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;84.114.163.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:54:28 CST 2025
;; MSG SIZE rcvd: 107
139.163.114.84.in-addr.arpa domain name pointer 84-114-163-139.cable.dynamic.surfer.at.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.163.114.84.in-addr.arpa name = 84-114-163-139.cable.dynamic.surfer.at.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 160.153.234.236 | attackspambots | 2020-06-07T04:21:00.835627shield sshd\[6709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-160-153-234-236.ip.secureserver.net user=root 2020-06-07T04:21:02.666929shield sshd\[6709\]: Failed password for root from 160.153.234.236 port 44500 ssh2 2020-06-07T04:24:18.082222shield sshd\[7990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-160-153-234-236.ip.secureserver.net user=root 2020-06-07T04:24:20.093712shield sshd\[7990\]: Failed password for root from 160.153.234.236 port 48152 ssh2 2020-06-07T04:27:30.299444shield sshd\[9531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-160-153-234-236.ip.secureserver.net user=root |
2020-06-07 12:33:57 |
| 129.211.24.104 | attackspambots | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-06-07 12:11:33 |
| 189.213.42.170 | attackbotsspam | Automatic report - Port Scan Attack |
2020-06-07 12:15:37 |
| 111.229.120.31 | attackbots | Wordpress malicious attack:[sshd] |
2020-06-07 12:11:52 |
| 124.239.148.63 | attack | Jun 7 06:12:24 vps647732 sshd[13830]: Failed password for root from 124.239.148.63 port 24591 ssh2 ... |
2020-06-07 12:19:26 |
| 112.35.77.101 | attackspambots | Jun 6 20:50:02 pixelmemory sshd[529577]: Failed password for root from 112.35.77.101 port 56998 ssh2 Jun 6 20:54:08 pixelmemory sshd[541703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.77.101 user=root Jun 6 20:54:10 pixelmemory sshd[541703]: Failed password for root from 112.35.77.101 port 50424 ssh2 Jun 6 20:58:41 pixelmemory sshd[556093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.77.101 user=root Jun 6 20:58:43 pixelmemory sshd[556093]: Failed password for root from 112.35.77.101 port 43846 ssh2 ... |
2020-06-07 12:33:22 |
| 46.97.186.242 | attack | Automatic report - Port Scan Attack |
2020-06-07 12:29:15 |
| 141.98.9.160 | attackspambots | 2020-06-06T14:18:24.627428homeassistant sshd[18324]: Failed password for invalid user user from 141.98.9.160 port 34391 ssh2 2020-06-07T03:59:25.494765homeassistant sshd[2356]: Invalid user user from 141.98.9.160 port 43849 2020-06-07T03:59:25.506598homeassistant sshd[2356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.160 ... |
2020-06-07 12:05:47 |
| 218.92.0.171 | attackspam | Jun 7 06:58:25 ift sshd\[13804\]: Failed password for root from 218.92.0.171 port 42419 ssh2Jun 7 06:58:27 ift sshd\[13804\]: Failed password for root from 218.92.0.171 port 42419 ssh2Jun 7 06:58:32 ift sshd\[13804\]: Failed password for root from 218.92.0.171 port 42419 ssh2Jun 7 06:58:35 ift sshd\[13804\]: Failed password for root from 218.92.0.171 port 42419 ssh2Jun 7 06:58:38 ift sshd\[13804\]: Failed password for root from 218.92.0.171 port 42419 ssh2 ... |
2020-06-07 12:37:04 |
| 159.89.188.167 | attackspambots | Jun 7 06:16:14 mout sshd[1782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.188.167 user=root Jun 7 06:16:16 mout sshd[1782]: Failed password for root from 159.89.188.167 port 44772 ssh2 |
2020-06-07 12:23:07 |
| 125.214.51.195 | attackbots | Unauthorised access (Jun 7) SRC=125.214.51.195 LEN=52 TTL=108 ID=31210 DF TCP DPT=445 WINDOW=8192 SYN |
2020-06-07 12:13:31 |
| 35.231.211.161 | attackspam | Jun 7 09:21:45 gw1 sshd[24169]: Failed password for root from 35.231.211.161 port 38860 ssh2 ... |
2020-06-07 12:30:18 |
| 152.136.34.209 | attackbotsspam | 2020-06-07T05:53:12.317558struts4.enskede.local sshd\[19309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.34.209 user=root 2020-06-07T05:53:15.572327struts4.enskede.local sshd\[19309\]: Failed password for root from 152.136.34.209 port 58886 ssh2 2020-06-07T05:56:37.311662struts4.enskede.local sshd\[19318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.34.209 user=root 2020-06-07T05:56:40.777569struts4.enskede.local sshd\[19318\]: Failed password for root from 152.136.34.209 port 45666 ssh2 2020-06-07T05:59:29.030164struts4.enskede.local sshd\[19329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.34.209 user=root ... |
2020-06-07 12:01:39 |
| 111.175.186.150 | attackspambots | Jun 6 19:54:56 ny01 sshd[28329]: Failed password for root from 111.175.186.150 port 11039 ssh2 Jun 6 19:57:59 ny01 sshd[29064]: Failed password for root from 111.175.186.150 port 53611 ssh2 |
2020-06-07 08:27:21 |
| 14.98.213.14 | attack | Jun 7 05:50:56 vps687878 sshd\[18892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.213.14 user=root Jun 7 05:50:59 vps687878 sshd\[18892\]: Failed password for root from 14.98.213.14 port 41574 ssh2 Jun 7 05:54:48 vps687878 sshd\[19224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.213.14 user=root Jun 7 05:54:51 vps687878 sshd\[19224\]: Failed password for root from 14.98.213.14 port 44112 ssh2 Jun 7 05:58:45 vps687878 sshd\[19777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.213.14 user=root ... |
2020-06-07 12:04:27 |