City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.143.45.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46257
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.143.45.12. IN A
;; AUTHORITY SECTION:
. 578 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031100 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 11 18:05:35 CST 2022
;; MSG SIZE rcvd: 106
12.45.143.104.in-addr.arpa domain name pointer 104.143.45.12.static.klayer.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
12.45.143.104.in-addr.arpa name = 104.143.45.12.static.klayer.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
37.59.100.22 | attackbots | 2019-10-30T22:26:53.032220shield sshd\[10557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=22.ip-37-59-100.eu user=root 2019-10-30T22:26:55.338273shield sshd\[10557\]: Failed password for root from 37.59.100.22 port 52322 ssh2 2019-10-30T22:30:29.565707shield sshd\[11222\]: Invalid user com from 37.59.100.22 port 43056 2019-10-30T22:30:29.569952shield sshd\[11222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=22.ip-37-59-100.eu 2019-10-30T22:30:31.199085shield sshd\[11222\]: Failed password for invalid user com from 37.59.100.22 port 43056 ssh2 |
2019-10-31 08:05:09 |
223.4.70.106 | attack | detected by Fail2Ban |
2019-10-31 08:01:42 |
89.248.167.131 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 85 - port: 119 proto: TCP cat: Misc Attack |
2019-10-31 08:07:14 |
118.122.124.78 | attackspambots | Oct 30 17:20:57 firewall sshd[27104]: Invalid user oracle from 118.122.124.78 Oct 30 17:20:59 firewall sshd[27104]: Failed password for invalid user oracle from 118.122.124.78 port 38728 ssh2 Oct 30 17:24:33 firewall sshd[27171]: Invalid user wx from 118.122.124.78 ... |
2019-10-31 07:45:31 |
218.188.210.214 | attackspam | Invalid user user from 218.188.210.214 port 38946 |
2019-10-31 07:46:36 |
222.211.162.211 | attackspambots | 2019-10-30T23:30:13.500469abusebot-5.cloudsearch.cf sshd\[23516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.211.162.211 user=root |
2019-10-31 08:07:38 |
176.31.250.160 | attackspambots | Automatic report - Banned IP Access |
2019-10-31 07:51:35 |
182.72.0.250 | attack | Automatic report - Banned IP Access |
2019-10-31 07:42:17 |
46.38.144.17 | attack | Oct 31 00:54:24 webserver postfix/smtpd\[19352\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 31 00:55:35 webserver postfix/smtpd\[19379\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 31 00:56:46 webserver postfix/smtpd\[19379\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 31 00:57:58 webserver postfix/smtpd\[19352\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 31 00:59:09 webserver postfix/smtpd\[19379\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2019-10-31 08:00:30 |
51.91.136.174 | attackspam | 2019-10-30T23:15:03.894786shield sshd\[24698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.136.174 user=root 2019-10-30T23:15:05.611352shield sshd\[24698\]: Failed password for root from 51.91.136.174 port 58802 ssh2 2019-10-30T23:20:00.915825shield sshd\[26182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.136.174 user=root 2019-10-30T23:20:02.737801shield sshd\[26182\]: Failed password for root from 51.91.136.174 port 44234 ssh2 2019-10-30T23:25:02.859802shield sshd\[27517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.136.174 user=root |
2019-10-31 07:57:07 |
54.37.158.218 | attackspam | detected by Fail2Ban |
2019-10-31 07:41:05 |
193.112.121.63 | attackspambots | Oct 30 23:19:13 localhost sshd\[29731\]: Invalid user oracle from 193.112.121.63 port 41442 Oct 30 23:19:13 localhost sshd\[29731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.121.63 Oct 30 23:19:16 localhost sshd\[29731\]: Failed password for invalid user oracle from 193.112.121.63 port 41442 ssh2 Oct 30 23:23:57 localhost sshd\[29829\]: Invalid user mike from 193.112.121.63 port 52482 Oct 30 23:23:57 localhost sshd\[29829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.121.63 ... |
2019-10-31 07:34:47 |
41.33.119.67 | attackspambots | Oct 30 23:20:10 server sshd\[28671\]: Invalid user tac2 from 41.33.119.67 port 14153 Oct 30 23:20:10 server sshd\[28671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.33.119.67 Oct 30 23:20:12 server sshd\[28671\]: Failed password for invalid user tac2 from 41.33.119.67 port 14153 ssh2 Oct 30 23:24:10 server sshd\[28992\]: Invalid user git from 41.33.119.67 port 14923 Oct 30 23:24:10 server sshd\[28992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.33.119.67 |
2019-10-31 07:57:21 |
210.21.226.2 | attackspambots | Oct 30 20:55:21 XXX sshd[15655]: Invalid user alcorn from 210.21.226.2 port 29517 |
2019-10-31 07:40:38 |
140.143.30.191 | attackbotsspam | Oct 30 21:20:19 amit sshd\[523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.30.191 user=root Oct 30 21:20:21 amit sshd\[523\]: Failed password for root from 140.143.30.191 port 36970 ssh2 Oct 30 21:24:42 amit sshd\[540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.30.191 user=root ... |
2019-10-31 07:39:04 |