City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.234.54.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27316
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.234.54.134. IN A
;; AUTHORITY SECTION:
. 109 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023082300 1800 900 604800 86400
;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 23 21:49:47 CST 2023
;; MSG SIZE rcvd: 107
b'Host 134.54.234.103.in-addr.arpa not found: 2(SERVFAIL)
'
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 134.54.234.103.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
112.85.42.176 | attack | Feb 6 19:20:34 nextcloud sshd\[11163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176 user=root Feb 6 19:20:35 nextcloud sshd\[11163\]: Failed password for root from 112.85.42.176 port 46025 ssh2 Feb 6 19:20:55 nextcloud sshd\[11529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176 user=root |
2020-02-07 02:25:58 |
148.70.136.94 | attackspam | $f2bV_matches |
2020-02-07 02:19:36 |
207.189.170.14 | attackspambots | Feb 6 15:14:18 ns382633 sshd\[31669\]: Invalid user xhd from 207.189.170.14 port 43864 Feb 6 15:14:18 ns382633 sshd\[31669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.189.170.14 Feb 6 15:14:19 ns382633 sshd\[31669\]: Failed password for invalid user xhd from 207.189.170.14 port 43864 ssh2 Feb 6 15:26:41 ns382633 sshd\[1644\]: Invalid user kgk from 207.189.170.14 port 57998 Feb 6 15:26:41 ns382633 sshd\[1644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.189.170.14 |
2020-02-07 02:12:02 |
202.5.40.74 | attack | [05/Feb/2020:02:19:59 -0500] "GET / HTTP/1.1" Chrome 51.0 UA |
2020-02-07 02:06:13 |
41.60.235.114 | attackspambots | port scan and connect, tcp 22 (ssh) |
2020-02-07 02:38:56 |
125.124.38.96 | attackbots | invalid login attempt (rip) |
2020-02-07 02:22:30 |
222.186.180.142 | attackbots | 02/06/2020-13:20:17.367818 222.186.180.142 Protocol: 6 ET SCAN Potential SSH Scan |
2020-02-07 02:30:43 |
5.196.74.190 | attackspambots | Feb 6 18:11:41 game-panel sshd[11468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.74.190 Feb 6 18:11:43 game-panel sshd[11468]: Failed password for invalid user test1 from 5.196.74.190 port 52850 ssh2 Feb 6 18:20:02 game-panel sshd[11825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.74.190 |
2020-02-07 02:21:59 |
139.59.69.76 | attackbots | $f2bV_matches |
2020-02-07 02:21:26 |
36.153.0.229 | attack | $f2bV_matches |
2020-02-07 02:09:04 |
222.124.18.155 | attack | Feb 6 15:28:45 XXX sshd[35518]: Invalid user butter from 222.124.18.155 port 56397 |
2020-02-07 02:12:50 |
147.135.122.35 | attackspam | 3389BruteforceFW23 |
2020-02-07 02:14:22 |
222.186.173.183 | attackspam | Feb 6 07:44:38 php1 sshd\[20766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183 user=root Feb 6 07:44:40 php1 sshd\[20766\]: Failed password for root from 222.186.173.183 port 14698 ssh2 Feb 6 07:44:43 php1 sshd\[20766\]: Failed password for root from 222.186.173.183 port 14698 ssh2 Feb 6 07:44:57 php1 sshd\[20811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183 user=root Feb 6 07:44:59 php1 sshd\[20811\]: Failed password for root from 222.186.173.183 port 41196 ssh2 |
2020-02-07 01:59:06 |
142.93.235.47 | attackspam | Feb 6 15:31:53 srv-ubuntu-dev3 sshd[68351]: Invalid user puq from 142.93.235.47 Feb 6 15:31:53 srv-ubuntu-dev3 sshd[68351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.235.47 Feb 6 15:31:53 srv-ubuntu-dev3 sshd[68351]: Invalid user puq from 142.93.235.47 Feb 6 15:31:56 srv-ubuntu-dev3 sshd[68351]: Failed password for invalid user puq from 142.93.235.47 port 44808 ssh2 Feb 6 15:35:01 srv-ubuntu-dev3 sshd[68592]: Invalid user kal from 142.93.235.47 Feb 6 15:35:01 srv-ubuntu-dev3 sshd[68592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.235.47 Feb 6 15:35:01 srv-ubuntu-dev3 sshd[68592]: Invalid user kal from 142.93.235.47 Feb 6 15:35:03 srv-ubuntu-dev3 sshd[68592]: Failed password for invalid user kal from 142.93.235.47 port 46562 ssh2 Feb 6 15:38:14 srv-ubuntu-dev3 sshd[68911]: Invalid user sro from 142.93.235.47 ... |
2020-02-07 01:59:28 |
180.76.246.38 | attack | $f2bV_matches |
2020-02-07 02:17:16 |