City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.135.0.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29835
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.135.0.70. IN A
;; AUTHORITY SECTION:
. 160 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:56:55 CST 2022
;; MSG SIZE rcvd: 105
70.0.135.129.in-addr.arpa domain name pointer synergy.intergraph.com.
70.0.135.129.in-addr.arpa domain name pointer maintenance.intergraph.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
70.0.135.129.in-addr.arpa name = maintenance.intergraph.com.
70.0.135.129.in-addr.arpa name = synergy.intergraph.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
51.15.207.74 | attack | 2020-03-22T10:54:08.849768abusebot-4.cloudsearch.cf sshd[19350]: Invalid user maui from 51.15.207.74 port 32858 2020-03-22T10:54:08.856066abusebot-4.cloudsearch.cf sshd[19350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.207.74 2020-03-22T10:54:08.849768abusebot-4.cloudsearch.cf sshd[19350]: Invalid user maui from 51.15.207.74 port 32858 2020-03-22T10:54:10.662963abusebot-4.cloudsearch.cf sshd[19350]: Failed password for invalid user maui from 51.15.207.74 port 32858 ssh2 2020-03-22T10:57:54.532673abusebot-4.cloudsearch.cf sshd[19587]: Invalid user am from 51.15.207.74 port 49106 2020-03-22T10:57:54.541824abusebot-4.cloudsearch.cf sshd[19587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.207.74 2020-03-22T10:57:54.532673abusebot-4.cloudsearch.cf sshd[19587]: Invalid user am from 51.15.207.74 port 49106 2020-03-22T10:57:56.374957abusebot-4.cloudsearch.cf sshd[19587]: Failed password for in ... |
2020-03-22 20:32:26 |
125.212.203.113 | attackspambots | Mar 22 09:41:18 legacy sshd[25383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.203.113 Mar 22 09:41:19 legacy sshd[25383]: Failed password for invalid user nq from 125.212.203.113 port 51204 ssh2 Mar 22 09:45:10 legacy sshd[25463]: Failed password for proxy from 125.212.203.113 port 43886 ssh2 ... |
2020-03-22 21:02:06 |
43.252.11.4 | attack | Lines containing failures of 43.252.11.4 Mar 19 12:23:35 dns01 sshd[22806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.252.11.4 user=r.r Mar 19 12:23:37 dns01 sshd[22806]: Failed password for r.r from 43.252.11.4 port 34998 ssh2 Mar 19 12:23:37 dns01 sshd[22806]: Received disconnect from 43.252.11.4 port 34998:11: Bye Bye [preauth] Mar 19 12:23:37 dns01 sshd[22806]: Disconnected from authenticating user r.r 43.252.11.4 port 34998 [preauth] Mar 19 12:44:24 dns01 sshd[26742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.252.11.4 user=mysql Mar 19 12:44:26 dns01 sshd[26742]: Failed password for mysql from 43.252.11.4 port 52430 ssh2 Mar 19 12:44:27 dns01 sshd[26742]: Received disconnect from 43.252.11.4 port 52430:11: Bye Bye [preauth] Mar 19 12:44:27 dns01 sshd[26742]: Disconnected from authenticating user mysql 43.252.11.4 port 52430 [preauth] Mar 19 12:53:05 dns01 sshd[28807]:........ ------------------------------ |
2020-03-22 20:48:14 |
115.126.226.134 | attackbots | Port Scan |
2020-03-22 20:28:36 |
179.185.104.250 | attackspambots | Mar 22 08:49:00 plex sshd[12763]: Invalid user cdimascio from 179.185.104.250 port 45381 |
2020-03-22 20:58:41 |
187.190.45.120 | attackspam | 2020-03-2204:47:211jFra4-00043d-Gx\<=info@whatsup2013.chH=\(localhost\)[14.186.182.29]:34632P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3647id=9E9B2D7E75A18F3CE0E5AC14D03BB09C@whatsup2013.chT="iamChristina"forynflyg@gmail.comjonathan_stevenson1@hotmail.com2020-03-2204:45:001jFrXn-0003sR-Do\<=info@whatsup2013.chH=045-238-122-160.provecom.com.br\(localhost\)[45.238.122.160]:38099P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3746id=313482D1DA0E20934F4A03BB7FA3DD33@whatsup2013.chT="iamChristina"forzzrxt420@gmail.comdemcatz@yahoo.com2020-03-2204:47:261jFra9-000442-Gu\<=info@whatsup2013.chH=fixed-187-190-45-120.totalplay.net\(localhost\)[187.190.45.120]:57389P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3746id=7277C192994D63D00C0940F83CF509FE@whatsup2013.chT="iamChristina"forjvcan@aol.comtjgj84@gmail.com2020-03-2204:45:101jFrXx-0003tS-BI\<=info@whatsup2013.chH=\(localhost\)[ |
2020-03-22 20:40:01 |
46.105.227.206 | attack | 3x Failed Password |
2020-03-22 20:48:39 |
103.60.214.110 | attackbots | Brute force attempt |
2020-03-22 20:24:28 |
109.167.231.99 | attackbotsspam | Mar 22 08:10:33 plusreed sshd[22924]: Invalid user ibpliups from 109.167.231.99 ... |
2020-03-22 20:12:15 |
175.24.109.20 | attackbots | (sshd) Failed SSH login from 175.24.109.20 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 22 11:47:47 ubnt-55d23 sshd[22218]: Invalid user test from 175.24.109.20 port 40064 Mar 22 11:47:50 ubnt-55d23 sshd[22218]: Failed password for invalid user test from 175.24.109.20 port 40064 ssh2 |
2020-03-22 20:34:32 |
89.248.172.85 | attackspam | firewall-block, port(s): 3637/tcp, 3805/tcp, 3980/tcp, 64000/tcp |
2020-03-22 20:40:37 |
45.238.122.160 | attackspambots | 2020-03-2204:47:211jFra4-00043d-Gx\<=info@whatsup2013.chH=\(localhost\)[14.186.182.29]:34632P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3647id=9E9B2D7E75A18F3CE0E5AC14D03BB09C@whatsup2013.chT="iamChristina"forynflyg@gmail.comjonathan_stevenson1@hotmail.com2020-03-2204:45:001jFrXn-0003sR-Do\<=info@whatsup2013.chH=045-238-122-160.provecom.com.br\(localhost\)[45.238.122.160]:38099P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3746id=313482D1DA0E20934F4A03BB7FA3DD33@whatsup2013.chT="iamChristina"forzzrxt420@gmail.comdemcatz@yahoo.com2020-03-2204:47:261jFra9-000442-Gu\<=info@whatsup2013.chH=fixed-187-190-45-120.totalplay.net\(localhost\)[187.190.45.120]:57389P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3746id=7277C192994D63D00C0940F83CF509FE@whatsup2013.chT="iamChristina"forjvcan@aol.comtjgj84@gmail.com2020-03-2204:45:101jFrXx-0003tS-BI\<=info@whatsup2013.chH=\(localhost\)[ |
2020-03-22 20:41:46 |
106.12.96.23 | attack | 5x Failed Password |
2020-03-22 20:14:08 |
106.13.228.153 | attack | 2020-03-22T12:52:13.817629v22018076590370373 sshd[9675]: Invalid user vnc from 106.13.228.153 port 49064 2020-03-22T12:52:13.823618v22018076590370373 sshd[9675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.228.153 2020-03-22T12:52:13.817629v22018076590370373 sshd[9675]: Invalid user vnc from 106.13.228.153 port 49064 2020-03-22T12:52:15.395202v22018076590370373 sshd[9675]: Failed password for invalid user vnc from 106.13.228.153 port 49064 ssh2 2020-03-22T12:58:23.205348v22018076590370373 sshd[11819]: Invalid user cpanelphpmyadmin from 106.13.228.153 port 48650 ... |
2020-03-22 20:52:20 |
168.61.176.121 | attackbots | $f2bV_matches |
2020-03-22 21:03:35 |