City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.164.119.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.164.119.12. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:22:40 CST 2025
;; MSG SIZE rcvd: 107
12.119.164.104.in-addr.arpa domain name pointer exponential12.hvghfs104.entrappr.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
12.119.164.104.in-addr.arpa name = exponential12.hvghfs104.entrappr.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 46.101.114.161 | attack |
|
2020-10-11 22:03:50 |
| 119.45.142.72 | attackspambots | 2020-10-11T09:30:14+0000 Failed SSH Authentication/Brute Force Attack. (Server 6) |
2020-10-11 22:12:35 |
| 113.176.89.116 | attackspambots | Oct 11 10:49:56 rancher-0 sshd[596071]: Invalid user nelson from 113.176.89.116 port 33052 ... |
2020-10-11 22:07:21 |
| 116.196.101.168 | attackbots | 2020-10-11T16:15:00.694546hostname sshd[10456]: Invalid user apache1 from 116.196.101.168 port 56496 2020-10-11T16:15:02.984575hostname sshd[10456]: Failed password for invalid user apache1 from 116.196.101.168 port 56496 ssh2 2020-10-11T16:23:55.356416hostname sshd[13946]: Invalid user postgresql from 116.196.101.168 port 49314 ... |
2020-10-11 22:01:03 |
| 180.76.151.248 | attack | Invalid user k from 180.76.151.248 port 52978 |
2020-10-11 22:24:00 |
| 112.85.42.181 | attack | Oct 11 07:23:38 propaganda sshd[104129]: Connection from 112.85.42.181 port 41032 on 10.0.0.161 port 22 rdomain "" Oct 11 07:23:39 propaganda sshd[104129]: Unable to negotiate with 112.85.42.181 port 41032: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] |
2020-10-11 22:26:12 |
| 54.38.33.178 | attackspambots | Oct 11 14:16:30 xeon sshd[761]: Failed password for root from 54.38.33.178 port 47016 ssh2 |
2020-10-11 22:36:56 |
| 122.194.229.54 | attackbotsspam | 2020-10-11T14:37:25.134873shield sshd\[16902\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.194.229.54 user=root 2020-10-11T14:37:26.468335shield sshd\[16902\]: Failed password for root from 122.194.229.54 port 39068 ssh2 2020-10-11T14:37:29.776368shield sshd\[16902\]: Failed password for root from 122.194.229.54 port 39068 ssh2 2020-10-11T14:37:32.960044shield sshd\[16902\]: Failed password for root from 122.194.229.54 port 39068 ssh2 2020-10-11T14:37:36.599129shield sshd\[16902\]: Failed password for root from 122.194.229.54 port 39068 ssh2 |
2020-10-11 22:39:21 |
| 37.59.123.166 | attack | 2020-10-11T16:05:48+0200 Failed SSH Authentication/Brute Force Attack. (Server 9) |
2020-10-11 22:16:22 |
| 188.165.180.122 | attack | 2020-10-06T06:25:17.3550531495-001 sshd[50670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip122.ip-188-165-180.eu user=r.r 2020-10-06T06:25:19.5776101495-001 sshd[50670]: Failed password for r.r from 188.165.180.122 port 52824 ssh2 2020-10-06T06:33:17.2771461495-001 sshd[51125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip122.ip-188-165-180.eu user=r.r 2020-10-06T06:33:19.3997661495-001 sshd[51125]: Failed password for r.r from 188.165.180.122 port 34692 ssh2 2020-10-06T06:40:59.9234441495-001 sshd[51536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip122.ip-188-165-180.eu user=r.r 2020-10-06T06:41:02.1313611495-001 sshd[51536]: Failed password for r.r from 188.165.180.122 port 44790 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=188.165.180.122 |
2020-10-11 22:23:19 |
| 95.77.104.79 | attackspambots | Dovecot Invalid User Login Attempt. |
2020-10-11 22:16:44 |
| 139.155.77.216 | attack | (sshd) Failed SSH login from 139.155.77.216 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 06:14:37 jbs1 sshd[21357]: Invalid user diane from 139.155.77.216 Oct 11 06:14:37 jbs1 sshd[21357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.77.216 Oct 11 06:14:38 jbs1 sshd[21357]: Failed password for invalid user diane from 139.155.77.216 port 32948 ssh2 Oct 11 06:30:39 jbs1 sshd[25632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.77.216 user=root Oct 11 06:30:41 jbs1 sshd[25632]: Failed password for root from 139.155.77.216 port 38620 ssh2 |
2020-10-11 22:13:59 |
| 39.103.142.195 | attackbots | Automatic report - Banned IP Access |
2020-10-11 22:11:19 |
| 222.186.30.112 | attack | Oct 11 10:17:03 NPSTNNYC01T sshd[24570]: Failed password for root from 222.186.30.112 port 25168 ssh2 Oct 11 10:17:05 NPSTNNYC01T sshd[24570]: Failed password for root from 222.186.30.112 port 25168 ssh2 Oct 11 10:17:08 NPSTNNYC01T sshd[24570]: Failed password for root from 222.186.30.112 port 25168 ssh2 ... |
2020-10-11 22:22:55 |
| 37.57.169.85 | attackbots | Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-10-11T13:53:21Z |
2020-10-11 22:18:45 |