City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.124.42.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26242
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.124.42.135. IN A
;; AUTHORITY SECTION:
. 348 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:04:54 CST 2022
;; MSG SIZE rcvd: 106
135.42.124.13.in-addr.arpa domain name pointer ec2-13-124-42-135.ap-northeast-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
135.42.124.13.in-addr.arpa name = ec2-13-124-42-135.ap-northeast-2.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
128.199.210.138 | attack | 128.199.210.138 - - [06/Oct/2020:04:36:00 +0100] "POST /wp-login.php HTTP/1.1" 200 2339 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 128.199.210.138 - - [06/Oct/2020:04:36:02 +0100] "POST /wp-login.php HTTP/1.1" 200 2311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 128.199.210.138 - - [06/Oct/2020:04:36:08 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-10-06 13:48:58 |
37.46.150.211 | attack | Oct 6 07:47:05 lnxded63 sshd[17150]: Failed password for root from 37.46.150.211 port 51140 ssh2 Oct 6 07:47:18 lnxded63 sshd[17152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.46.150.211 |
2020-10-06 13:53:38 |
111.229.137.13 | attackspambots | Oct 5 19:51:42 auw2 sshd\[22058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.137.13 user=root Oct 5 19:51:44 auw2 sshd\[22058\]: Failed password for root from 111.229.137.13 port 53448 ssh2 Oct 5 19:55:48 auw2 sshd\[22325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.137.13 user=root Oct 5 19:55:50 auw2 sshd\[22325\]: Failed password for root from 111.229.137.13 port 49630 ssh2 Oct 5 19:59:43 auw2 sshd\[22627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.137.13 user=root |
2020-10-06 14:10:56 |
112.29.170.59 | attackspambots | Oct 6 07:18:12 OPSO sshd\[1754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.29.170.59 user=root Oct 6 07:18:13 OPSO sshd\[1754\]: Failed password for root from 112.29.170.59 port 57108 ssh2 Oct 6 07:22:48 OPSO sshd\[2921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.29.170.59 user=root Oct 6 07:22:51 OPSO sshd\[2921\]: Failed password for root from 112.29.170.59 port 52646 ssh2 Oct 6 07:27:21 OPSO sshd\[3716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.29.170.59 user=root |
2020-10-06 13:39:44 |
212.70.149.68 | attackspam | Oct 6 07:30:10 cho postfix/smtps/smtpd[89775]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 6 07:32:06 cho postfix/smtps/smtpd[89775]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 6 07:34:01 cho postfix/smtps/smtpd[90022]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 6 07:35:55 cho postfix/smtps/smtpd[90022]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Oct 6 07:39:46 cho postfix/smtps/smtpd[90209]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-10-06 13:42:37 |
45.154.197.10 | attackbotsspam | Oct 6 05:21:23 vm1 sshd[29500]: Failed password for root from 45.154.197.10 port 40880 ssh2 ... |
2020-10-06 13:59:39 |
219.150.93.157 | attackspambots | Oct 5 22:57:32 shivevps sshd[6409]: Failed password for root from 219.150.93.157 port 39404 ssh2 Oct 5 23:02:03 shivevps sshd[6962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.150.93.157 user=root Oct 5 23:02:05 shivevps sshd[6962]: Failed password for root from 219.150.93.157 port 42118 ssh2 ... |
2020-10-06 13:56:15 |
138.121.170.194 | attackbots | 2020-10-06T01:02[Censored Hostname] sshd[19018]: Failed password for root from 138.121.170.194 port 57792 ssh2 2020-10-06T01:06[Censored Hostname] sshd[19857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.170.194.dnsgigas.es user=root 2020-10-06T01:06[Censored Hostname] sshd[19857]: Failed password for root from 138.121.170.194 port 60174 ssh2[...] |
2020-10-06 13:56:47 |
222.107.156.227 | attackbotsspam | Oct 6 07:36:06 PorscheCustomer sshd[14014]: Failed password for root from 222.107.156.227 port 58600 ssh2 Oct 6 07:38:43 PorscheCustomer sshd[14085]: Failed password for root from 222.107.156.227 port 21880 ssh2 ... |
2020-10-06 13:49:30 |
177.83.41.16 | attackbots | Attempts against non-existent wp-login |
2020-10-06 13:40:18 |
111.126.76.48 | attackspam | mail auth brute force |
2020-10-06 13:43:41 |
66.249.75.93 | attackbotsspam | Automatic report - Banned IP Access |
2020-10-06 14:22:15 |
122.194.229.122 | attack | Oct 6 08:21:00 nopemail auth.info sshd[17966]: Unable to negotiate with 122.194.229.122 port 41056: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] ... |
2020-10-06 14:21:27 |
213.155.29.104 | attackbotsspam | Oct 6 11:11:39 itv-usvr-01 sshd[5468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.155.29.104 user=root Oct 6 11:11:41 itv-usvr-01 sshd[5468]: Failed password for root from 213.155.29.104 port 37344 ssh2 Oct 6 11:15:24 itv-usvr-01 sshd[5633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.155.29.104 user=root Oct 6 11:15:27 itv-usvr-01 sshd[5633]: Failed password for root from 213.155.29.104 port 43808 ssh2 Oct 6 11:19:06 itv-usvr-01 sshd[5808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.155.29.104 user=root Oct 6 11:19:09 itv-usvr-01 sshd[5808]: Failed password for root from 213.155.29.104 port 50276 ssh2 |
2020-10-06 14:01:33 |
49.234.14.216 | attackspam | Oct 5 21:41:45 ws12vmsma01 sshd[36749]: Failed password for root from 49.234.14.216 port 54332 ssh2 Oct 5 21:42:53 ws12vmsma01 sshd[36892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.14.216 user=root Oct 5 21:42:55 ws12vmsma01 sshd[36892]: Failed password for root from 49.234.14.216 port 37842 ssh2 ... |
2020-10-06 13:54:33 |