City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.134.95.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;12.134.95.134. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 128 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 00:10:00 CST 2025
;; MSG SIZE rcvd: 106
134.95.134.12.in-addr.arpa domain name pointer 134.wi95.aust.dlstx31ur.dsl.att.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
134.95.134.12.in-addr.arpa name = 134.wi95.aust.dlstx31ur.dsl.att.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
106.53.242.188 | attackspam | Jun 28 01:32:36 lnxweb62 sshd[21850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.242.188 Jun 28 01:32:36 lnxweb62 sshd[21850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.242.188 |
2020-06-28 07:52:55 |
223.197.146.58 | attackspambots | Jun 27 22:40:06 inter-technics sshd[6210]: Invalid user vikas from 223.197.146.58 port 58029 Jun 27 22:40:06 inter-technics sshd[6210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.146.58 Jun 27 22:40:06 inter-technics sshd[6210]: Invalid user vikas from 223.197.146.58 port 58029 Jun 27 22:40:08 inter-technics sshd[6210]: Failed password for invalid user vikas from 223.197.146.58 port 58029 ssh2 Jun 27 22:44:14 inter-technics sshd[6477]: Invalid user admin from 223.197.146.58 port 49299 ... |
2020-06-28 07:57:46 |
218.92.0.184 | attackbots | Jun 28 01:59:04 server sshd[34724]: Failed none for root from 218.92.0.184 port 17772 ssh2 Jun 28 01:59:07 server sshd[34724]: Failed password for root from 218.92.0.184 port 17772 ssh2 Jun 28 01:59:11 server sshd[34724]: Failed password for root from 218.92.0.184 port 17772 ssh2 |
2020-06-28 08:01:10 |
180.250.108.133 | attack | 2020-06-27T18:43:13.6971791495-001 sshd[37017]: Failed password for root from 180.250.108.133 port 36722 ssh2 2020-06-27T18:46:47.8657771495-001 sshd[37126]: Invalid user sxc from 180.250.108.133 port 36858 2020-06-27T18:46:47.8691591495-001 sshd[37126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.108.133 2020-06-27T18:46:47.8657771495-001 sshd[37126]: Invalid user sxc from 180.250.108.133 port 36858 2020-06-27T18:46:49.2823251495-001 sshd[37126]: Failed password for invalid user sxc from 180.250.108.133 port 36858 ssh2 2020-06-27T18:50:17.9312281495-001 sshd[37266]: Invalid user matilda from 180.250.108.133 port 36930 ... |
2020-06-28 07:58:26 |
61.177.172.102 | attack | 2020-06-28T01:35:22.050645sd-86998 sshd[29094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.102 user=root 2020-06-28T01:35:23.975457sd-86998 sshd[29094]: Failed password for root from 61.177.172.102 port 20128 ssh2 2020-06-28T01:35:27.860263sd-86998 sshd[29094]: Failed password for root from 61.177.172.102 port 20128 ssh2 2020-06-28T01:35:22.050645sd-86998 sshd[29094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.102 user=root 2020-06-28T01:35:23.975457sd-86998 sshd[29094]: Failed password for root from 61.177.172.102 port 20128 ssh2 2020-06-28T01:35:27.860263sd-86998 sshd[29094]: Failed password for root from 61.177.172.102 port 20128 ssh2 2020-06-28T01:35:22.050645sd-86998 sshd[29094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.102 user=root 2020-06-28T01:35:23.975457sd-86998 sshd[29094]: Failed password for root from ... |
2020-06-28 07:37:31 |
45.62.254.138 | attackbotsspam | 2020-06-27T21:41:52+0000 Failed SSH Authentication/Brute Force Attack. (Server 6) |
2020-06-28 08:04:41 |
222.186.173.215 | attackspambots | Jun 28 02:12:38 abendstille sshd\[12647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215 user=root Jun 28 02:12:39 abendstille sshd\[12647\]: Failed password for root from 222.186.173.215 port 3558 ssh2 Jun 28 02:12:43 abendstille sshd\[12647\]: Failed password for root from 222.186.173.215 port 3558 ssh2 Jun 28 02:12:57 abendstille sshd\[13105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215 user=root Jun 28 02:12:59 abendstille sshd\[13105\]: Failed password for root from 222.186.173.215 port 49666 ssh2 ... |
2020-06-28 08:14:40 |
51.38.176.42 | attackbots | Jun 28 01:14:24 pve1 sshd[6536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.176.42 Jun 28 01:14:26 pve1 sshd[6536]: Failed password for invalid user wifi from 51.38.176.42 port 40826 ssh2 ... |
2020-06-28 07:40:50 |
61.7.147.29 | attackspambots | Jun 28 03:19:43 gw1 sshd[30597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.147.29 Jun 28 03:19:45 gw1 sshd[30597]: Failed password for invalid user serge from 61.7.147.29 port 59718 ssh2 ... |
2020-06-28 07:37:53 |
106.12.144.249 | attack | Jun 27 22:42:51 gestao sshd[25134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.144.249 Jun 27 22:42:53 gestao sshd[25134]: Failed password for invalid user songlin from 106.12.144.249 port 57120 ssh2 Jun 27 22:45:58 gestao sshd[25203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.144.249 ... |
2020-06-28 08:13:07 |
122.54.86.16 | attackbotsspam | Jun 27 05:26:31 xxxxxxx8434580 sshd[4324]: reveeclipse mapping checking getaddrinfo for 122.54.86.16.pldt.net [122.54.86.16] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 27 05:26:31 xxxxxxx8434580 sshd[4324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.54.86.16 user=r.r Jun 27 05:26:32 xxxxxxx8434580 sshd[4324]: Failed password for r.r from 122.54.86.16 port 50278 ssh2 Jun 27 05:26:33 xxxxxxx8434580 sshd[4324]: Received disconnect from 122.54.86.16: 11: Bye Bye [preauth] Jun 27 05:41:29 xxxxxxx8434580 sshd[4427]: reveeclipse mapping checking getaddrinfo for 122.54.86.16.pldt.net [122.54.86.16] failed - POSSIBLE BREAK-IN ATTEMPT! Jun 27 05:41:29 xxxxxxx8434580 sshd[4427]: Invalid user kiran from 122.54.86.16 Jun 27 05:41:29 xxxxxxx8434580 sshd[4427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.54.86.16 Jun 27 05:41:31 xxxxxxx8434580 sshd[4427]: Failed password for invalid user ki........ ------------------------------- |
2020-06-28 08:06:17 |
104.45.87.142 | attackbots | $f2bV_matches |
2020-06-28 07:43:32 |
51.83.74.126 | attackbots | ... |
2020-06-28 07:55:54 |
94.23.172.28 | attack | Ssh brute force |
2020-06-28 08:02:10 |
42.62.114.98 | attackbots | Bruteforce detected by fail2ban |
2020-06-28 07:44:42 |