City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.168.134.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31720
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;108.168.134.42. IN A
;; AUTHORITY SECTION:
. 517 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031400 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 14 20:40:46 CST 2022
;; MSG SIZE rcvd: 107
42.134.168.108.in-addr.arpa domain name pointer 2a.86.a86c.ip4.static.sl-reverse.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.134.168.108.in-addr.arpa name = 2a.86.a86c.ip4.static.sl-reverse.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
177.75.56.53 | attackbots | [N10.H1.VM1] Port Scanner Detected Blocked by UFW |
2020-08-13 20:13:15 |
47.9.93.23 | attackspambots | 20/8/12@23:46:47: FAIL: Alarm-Network address from=47.9.93.23 ... |
2020-08-13 19:45:01 |
106.13.230.36 | attackbots | $f2bV_matches |
2020-08-13 19:48:54 |
114.67.216.105 | attackbots | Failed password for root from 114.67.216.105 port 50966 ssh2 |
2020-08-13 20:01:29 |
41.58.129.134 | attack | Unauthorized connection attempt from IP address 41.58.129.134 on Port 445(SMB) |
2020-08-13 20:06:58 |
14.190.196.4 | attack | Unauthorized connection attempt from IP address 14.190.196.4 on Port 445(SMB) |
2020-08-13 20:10:11 |
110.49.70.246 | attackbots | SSH bruteforce |
2020-08-13 19:49:21 |
36.91.101.139 | attackspam | Unauthorized connection attempt from IP address 36.91.101.139 on Port 445(SMB) |
2020-08-13 19:53:26 |
122.170.14.17 | attackspambots | Unauthorized connection attempt from IP address 122.170.14.17 on Port 445(SMB) |
2020-08-13 20:06:04 |
103.82.80.87 | attackspam | Unauthorized connection attempt from IP address 103.82.80.87 on Port 445(SMB) |
2020-08-13 20:09:22 |
171.250.122.167 | attack | Unauthorized connection attempt from IP address 171.250.122.167 on Port 445(SMB) |
2020-08-13 19:50:54 |
62.171.189.221 | attackspambots | TCP ports : 88 / 8080 |
2020-08-13 19:56:55 |
210.178.94.227 | attackspambots | Aug 13 05:36:12 marvibiene sshd[6413]: Failed password for root from 210.178.94.227 port 35474 ssh2 |
2020-08-13 20:20:03 |
122.51.111.159 | attackspambots | fail2ban/Aug 13 11:52:11 h1962932 sshd[4812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.111.159 user=root Aug 13 11:52:13 h1962932 sshd[4812]: Failed password for root from 122.51.111.159 port 42380 ssh2 Aug 13 11:57:00 h1962932 sshd[4940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.111.159 user=root Aug 13 11:57:03 h1962932 sshd[4940]: Failed password for root from 122.51.111.159 port 60590 ssh2 Aug 13 12:01:46 h1962932 sshd[5167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.111.159 user=root Aug 13 12:01:47 h1962932 sshd[5167]: Failed password for root from 122.51.111.159 port 50568 ssh2 |
2020-08-13 19:54:21 |
5.160.92.82 | attackbots | Unauthorized connection attempt from IP address 5.160.92.82 on Port 445(SMB) |
2020-08-13 20:00:18 |