City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.106.148.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58092
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.106.148.190. IN A
;; AUTHORITY SECTION:
. 469 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022202 1800 900 604800 86400
;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 13:23:29 CST 2022
;; MSG SIZE rcvd: 108
190.148.106.129.in-addr.arpa domain name pointer uthouston.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
190.148.106.129.in-addr.arpa name = uthouston.edu.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 69.174.91.39 | attackspam | fell into ViewStateTrap:madrid |
2020-08-28 22:32:58 |
| 43.254.153.74 | attackspam | Aug 28 15:48:40 db sshd[12365]: Invalid user harry from 43.254.153.74 port 14571 ... |
2020-08-28 22:48:03 |
| 180.182.47.132 | attackspam | Aug 28 07:59:56 george sshd[30006]: Failed password for invalid user sale from 180.182.47.132 port 38680 ssh2 Aug 28 08:03:56 george sshd[30109]: Invalid user test1 from 180.182.47.132 port 41483 Aug 28 08:03:56 george sshd[30109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.182.47.132 Aug 28 08:03:58 george sshd[30109]: Failed password for invalid user test1 from 180.182.47.132 port 41483 ssh2 Aug 28 08:07:55 george sshd[30142]: Invalid user robi from 180.182.47.132 port 44286 ... |
2020-08-28 22:27:43 |
| 178.62.187.136 | attackbotsspam | 2020-08-28T17:39:07.147121lavrinenko.info sshd[30106]: Failed password for root from 178.62.187.136 port 39832 ssh2 2020-08-28T17:43:03.494430lavrinenko.info sshd[30346]: Invalid user backups from 178.62.187.136 port 46736 2020-08-28T17:43:03.503993lavrinenko.info sshd[30346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.187.136 2020-08-28T17:43:03.494430lavrinenko.info sshd[30346]: Invalid user backups from 178.62.187.136 port 46736 2020-08-28T17:43:05.102468lavrinenko.info sshd[30346]: Failed password for invalid user backups from 178.62.187.136 port 46736 ssh2 ... |
2020-08-28 22:54:14 |
| 112.215.113.10 | attackspam | Aug 28 12:27:01 game-panel sshd[7883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.215.113.10 Aug 28 12:27:03 game-panel sshd[7883]: Failed password for invalid user user from 112.215.113.10 port 56031 ssh2 Aug 28 12:32:39 game-panel sshd[8120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.215.113.10 |
2020-08-28 22:53:33 |
| 51.158.112.98 | attackspambots | Aug 28 14:08:08 kh-dev-server sshd[14376]: Failed password for root from 51.158.112.98 port 58986 ssh2 ... |
2020-08-28 22:12:37 |
| 120.237.118.139 | attack | Aug 28 15:30:56 vpn01 sshd[21548]: Failed password for root from 120.237.118.139 port 49442 ssh2 ... |
2020-08-28 22:14:28 |
| 195.54.167.167 | attackbots | Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-28T12:12:15Z and 2020-08-28T13:26:56Z |
2020-08-28 22:34:00 |
| 123.231.137.234 | attack | [N10.H1.VM1] Port Scanner Detected Blocked by UFW |
2020-08-28 22:32:33 |
| 159.65.1.41 | attack | Aug 28 16:10:27 vpn01 sshd[22510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.1.41 Aug 28 16:10:29 vpn01 sshd[22510]: Failed password for invalid user posto from 159.65.1.41 port 33060 ssh2 ... |
2020-08-28 22:26:41 |
| 218.92.0.165 | attackspambots | Aug 28 16:04:50 vps639187 sshd\[8745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165 user=root Aug 28 16:04:52 vps639187 sshd\[8745\]: Failed password for root from 218.92.0.165 port 27034 ssh2 Aug 28 16:04:56 vps639187 sshd\[8745\]: Failed password for root from 218.92.0.165 port 27034 ssh2 ... |
2020-08-28 22:09:46 |
| 59.63.98.178 | attackspam | spam (f2b h2) |
2020-08-28 22:29:17 |
| 222.186.31.83 | attack | Fail2Ban Ban Triggered |
2020-08-28 22:47:39 |
| 112.172.192.14 | attackspam | Aug 28 08:04:32 NPSTNNYC01T sshd[5787]: Failed password for root from 112.172.192.14 port 38064 ssh2 Aug 28 08:08:02 NPSTNNYC01T sshd[6130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.172.192.14 Aug 28 08:08:03 NPSTNNYC01T sshd[6130]: Failed password for invalid user user from 112.172.192.14 port 57028 ssh2 ... |
2020-08-28 22:17:12 |
| 196.1.97.216 | attackspambots | Aug 28 08:04:47 george sshd[30114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.97.216 Aug 28 08:04:49 george sshd[30114]: Failed password for invalid user zmm from 196.1.97.216 port 42494 ssh2 Aug 28 08:08:02 george sshd[30150]: Invalid user nara from 196.1.97.216 port 34572 Aug 28 08:08:02 george sshd[30150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.97.216 Aug 28 08:08:04 george sshd[30150]: Failed password for invalid user nara from 196.1.97.216 port 34572 ssh2 ... |
2020-08-28 22:14:08 |