City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.207.2.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58656
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.207.2.63. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 13:01:22 CST 2025
;; MSG SIZE rcvd: 104
b'Host 63.2.207.99.in-addr.arpa not found: 2(SERVFAIL)
'
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 63.2.207.99.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 158.58.128.63 | attack | [portscan] Port scan |
2019-09-17 06:23:32 |
| 51.174.116.225 | attackbots | Sep 16 22:57:06 pornomens sshd\[30537\]: Invalid user oracle from 51.174.116.225 port 51074 Sep 16 22:57:06 pornomens sshd\[30537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.174.116.225 Sep 16 22:57:08 pornomens sshd\[30537\]: Failed password for invalid user oracle from 51.174.116.225 port 51074 ssh2 ... |
2019-09-17 05:59:19 |
| 87.236.212.105 | attackspambots | Multiple failed RDP login attempts |
2019-09-17 06:17:46 |
| 217.65.27.132 | attackbotsspam | Invalid user xr from 217.65.27.132 port 56640 |
2019-09-17 06:02:34 |
| 77.247.110.155 | attackbots | *Port Scan* detected from 77.247.110.155 (NL/Netherlands/-). 4 hits in the last 285 seconds |
2019-09-17 06:33:57 |
| 138.197.195.52 | attackbotsspam | Sep 17 00:01:00 root sshd[27206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.195.52 Sep 17 00:01:02 root sshd[27206]: Failed password for invalid user music from 138.197.195.52 port 59686 ssh2 Sep 17 00:05:21 root sshd[27241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.195.52 ... |
2019-09-17 06:07:41 |
| 159.226.119.115 | attackspambots | Sep 17 01:21:35 www sshd\[199224\]: Invalid user super from 159.226.119.115 Sep 17 01:21:35 www sshd\[199224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.226.119.115 Sep 17 01:21:37 www sshd\[199224\]: Failed password for invalid user super from 159.226.119.115 port 33686 ssh2 ... |
2019-09-17 06:39:02 |
| 158.69.220.70 | attackbotsspam | *Port Scan* detected from 158.69.220.70 (CA/Canada/70.ip-158-69-220.net). 4 hits in the last 145 seconds |
2019-09-17 06:40:55 |
| 115.62.14.237 | attackspambots | " " |
2019-09-17 06:15:35 |
| 43.231.61.146 | attack | Sep 17 00:18:02 srv206 sshd[2124]: Invalid user netapp from 43.231.61.146 ... |
2019-09-17 06:35:29 |
| 176.31.251.177 | attackspam | Sep 16 18:30:55 Tower sshd[21095]: Connection from 176.31.251.177 port 59060 on 192.168.10.220 port 22 Sep 16 18:31:00 Tower sshd[21095]: Invalid user web from 176.31.251.177 port 59060 Sep 16 18:31:00 Tower sshd[21095]: error: Could not get shadow information for NOUSER Sep 16 18:31:00 Tower sshd[21095]: Failed password for invalid user web from 176.31.251.177 port 59060 ssh2 Sep 16 18:31:00 Tower sshd[21095]: Received disconnect from 176.31.251.177 port 59060:11: Bye Bye [preauth] Sep 16 18:31:00 Tower sshd[21095]: Disconnected from invalid user web 176.31.251.177 port 59060 [preauth] |
2019-09-17 06:40:20 |
| 167.71.14.214 | attack | Reported by AbuseIPDB proxy server. |
2019-09-17 06:14:00 |
| 117.50.13.42 | attack | Sep 16 17:06:13 plusreed sshd[31490]: Invalid user sandbox from 117.50.13.42 ... |
2019-09-17 06:14:33 |
| 104.236.30.168 | attackspam | Sep 16 10:46:42 kapalua sshd\[26317\]: Invalid user xx from 104.236.30.168 Sep 16 10:46:42 kapalua sshd\[26317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.30.168 Sep 16 10:46:45 kapalua sshd\[26317\]: Failed password for invalid user xx from 104.236.30.168 port 60554 ssh2 Sep 16 10:50:44 kapalua sshd\[26676\]: Invalid user postgres1 from 104.236.30.168 Sep 16 10:50:44 kapalua sshd\[26676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.30.168 |
2019-09-17 06:21:48 |
| 138.197.67.39 | attackspam | Sep 16 19:32:50 localhost sshd\[19541\]: Invalid user bigdiawusr from 138.197.67.39 port 46934 Sep 16 19:32:50 localhost sshd\[19541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.67.39 Sep 16 19:32:53 localhost sshd\[19541\]: Failed password for invalid user bigdiawusr from 138.197.67.39 port 46934 ssh2 ... |
2019-09-17 06:01:32 |