City: unknown
Region: unknown
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.14.89.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48845
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;94.14.89.64. IN A
;; AUTHORITY SECTION:
. 164 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022062401 1800 900 604800 86400
;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 25 04:26:17 CST 2022
;; MSG SIZE rcvd: 104
64.89.14.94.in-addr.arpa domain name pointer 5e0e5940.bb.sky.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
64.89.14.94.in-addr.arpa name = 5e0e5940.bb.sky.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 87.117.2.7 | attackspambots | Unauthorized connection attempt from IP address 87.117.2.7 on Port 445(SMB) |
2020-07-11 00:58:29 |
| 141.98.9.161 | attack | Jul 10 15:57:53 *** sshd[26755]: Invalid user admin from 141.98.9.161 |
2020-07-11 00:27:40 |
| 180.76.240.225 | attackspam | DATE:2020-07-10 16:34:55, IP:180.76.240.225, PORT:ssh SSH brute force auth (docker-dc) |
2020-07-11 00:18:07 |
| 82.59.104.91 | attackbots | Jul 10 09:33:33 Host-KEWR-E amavis[6310]: (06310-19) Blocked SPAM {RejectedOutbound}, AM.PDP-SOCK LOCAL [82.59.104.91] [82.59.104.91] |
2020-07-11 00:56:32 |
| 18.216.31.131 | attack | mue-Direct access to plugin not allowed |
2020-07-11 00:30:13 |
| 86.108.73.42 | attack | Unauthorized connection attempt from IP address 86.108.73.42 on Port 445(SMB) |
2020-07-11 00:54:17 |
| 195.222.172.126 | attackspambots | Unauthorized connection attempt from IP address 195.222.172.126 on Port 445(SMB) |
2020-07-11 00:36:04 |
| 179.185.78.91 | attack | SSH Brute Force |
2020-07-11 00:19:13 |
| 170.0.129.126 | attackbotsspam | Automatic report - Port Scan Attack |
2020-07-11 00:56:00 |
| 152.250.112.236 | attackbots | 1594384373 - 07/10/2020 14:32:53 Host: 152.250.112.236/152.250.112.236 Port: 445 TCP Blocked |
2020-07-11 00:41:57 |
| 64.213.148.44 | attackbotsspam | Jul 10 17:30:38 vps333114 sshd[21384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.213.148.44 Jul 10 17:30:40 vps333114 sshd[21384]: Failed password for invalid user sexy from 64.213.148.44 port 60572 ssh2 ... |
2020-07-11 00:39:13 |
| 42.114.250.217 | attack | Unauthorized connection attempt from IP address 42.114.250.217 on Port 445(SMB) |
2020-07-11 00:49:06 |
| 119.96.120.113 | attack | 2020-07-10T19:23:38.222742lavrinenko.info sshd[7507]: Invalid user lynx from 119.96.120.113 port 33840 2020-07-10T19:23:38.229323lavrinenko.info sshd[7507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.120.113 2020-07-10T19:23:38.222742lavrinenko.info sshd[7507]: Invalid user lynx from 119.96.120.113 port 33840 2020-07-10T19:23:40.119123lavrinenko.info sshd[7507]: Failed password for invalid user lynx from 119.96.120.113 port 33840 ssh2 2020-07-10T19:27:25.098633lavrinenko.info sshd[7785]: Invalid user fangce from 119.96.120.113 port 44658 ... |
2020-07-11 00:42:55 |
| 167.99.76.214 | attack | Invalid user bhubaneswar from 167.99.76.214 port 59620 |
2020-07-11 00:41:33 |
| 218.92.0.212 | attack | Jul 10 18:18:13 ovpn sshd\[7701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212 user=root Jul 10 18:18:16 ovpn sshd\[7701\]: Failed password for root from 218.92.0.212 port 61112 ssh2 Jul 10 18:18:19 ovpn sshd\[7701\]: Failed password for root from 218.92.0.212 port 61112 ssh2 Jul 10 18:18:22 ovpn sshd\[7701\]: Failed password for root from 218.92.0.212 port 61112 ssh2 Jul 10 18:18:36 ovpn sshd\[7800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212 user=root |
2020-07-11 00:28:57 |