City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.44.14.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26793
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.44.14.205. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 22:03:58 CST 2025
;; MSG SIZE rcvd: 105
205.14.44.99.in-addr.arpa domain name pointer 99-44-14-205.lightspeed.btrgla.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
205.14.44.99.in-addr.arpa name = 99-44-14-205.lightspeed.btrgla.sbcglobal.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.193.68.212 | attackspam | May 10 00:05:22 prox sshd[26685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.193.68.212 May 10 00:05:24 prox sshd[26685]: Failed password for invalid user jorge from 41.193.68.212 port 60520 ssh2 |
2020-05-10 07:22:43 |
| 123.201.42.128 | attackbotsspam | Automatic report - Port Scan Attack |
2020-05-10 07:35:12 |
| 180.167.240.222 | attackspambots | SSH Invalid Login |
2020-05-10 07:23:21 |
| 180.76.97.180 | attackbotsspam | Tried sshing with brute force. |
2020-05-10 07:09:59 |
| 35.245.33.180 | attackbots | May 9 22:12:21 scw-6657dc sshd[18601]: Failed password for root from 35.245.33.180 port 39544 ssh2 May 9 22:12:21 scw-6657dc sshd[18601]: Failed password for root from 35.245.33.180 port 39544 ssh2 May 9 22:14:25 scw-6657dc sshd[18661]: Invalid user joker from 35.245.33.180 port 35538 ... |
2020-05-10 07:05:57 |
| 61.76.169.138 | attackbots | SSH Invalid Login |
2020-05-10 07:12:49 |
| 138.68.82.194 | attack | May 10 00:55:10 roki-contabo sshd\[30581\]: Invalid user test from 138.68.82.194 May 10 00:55:10 roki-contabo sshd\[30581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.82.194 May 10 00:55:12 roki-contabo sshd\[30581\]: Failed password for invalid user test from 138.68.82.194 port 42682 ssh2 May 10 01:03:13 roki-contabo sshd\[30710\]: Invalid user teamspeak3 from 138.68.82.194 May 10 01:03:13 roki-contabo sshd\[30710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.82.194 ... |
2020-05-10 07:39:52 |
| 5.39.77.117 | attackbots | May 10 00:55:47 vps647732 sshd[26141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.77.117 May 10 00:55:49 vps647732 sshd[26141]: Failed password for invalid user lhj from 5.39.77.117 port 34027 ssh2 ... |
2020-05-10 07:03:04 |
| 198.27.90.106 | attackbots | k+ssh-bruteforce |
2020-05-10 07:40:20 |
| 96.250.62.192 | attackspam | Automatic report - Port Scan |
2020-05-10 07:36:48 |
| 125.91.124.125 | attack | May 9 22:28:00 vps639187 sshd\[4248\]: Invalid user guest from 125.91.124.125 port 37432 May 9 22:28:00 vps639187 sshd\[4248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.91.124.125 May 9 22:28:02 vps639187 sshd\[4248\]: Failed password for invalid user guest from 125.91.124.125 port 37432 ssh2 ... |
2020-05-10 07:29:35 |
| 101.71.3.53 | attack | May 9 13:28:08 mockhub sshd[11324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.3.53 May 9 13:28:10 mockhub sshd[11324]: Failed password for invalid user hulda from 101.71.3.53 port 39938 ssh2 ... |
2020-05-10 07:24:44 |
| 190.78.122.237 | attackspam | nft/Honeypot/22/73e86 |
2020-05-10 07:09:02 |
| 109.168.66.27 | attackbotsspam | May 10 00:46:53 vps647732 sshd[25419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.168.66.27 May 10 00:46:56 vps647732 sshd[25419]: Failed password for invalid user huang from 109.168.66.27 port 51944 ssh2 ... |
2020-05-10 07:04:30 |
| 222.186.15.246 | attack | Brute force SSH attack |
2020-05-10 07:18:13 |