City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.106.154.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34945
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.106.154.192. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019070102 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 02 05:34:32 CST 2019
;; MSG SIZE rcvd: 119
192.154.106.134.in-addr.arpa domain name pointer fk3mk-825796.w2kroot.uni-oldenburg.de.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
192.154.106.134.in-addr.arpa name = fk3mk-825796.w2kroot.uni-oldenburg.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
93.191.157.11 | attackspambots | SSH Bruteforce |
2019-11-17 19:32:51 |
51.91.48.22 | attack | 2019-11-17T10:56:01.819141abusebot-2.cloudsearch.cf sshd\[18766\]: Invalid user tyadmin from 51.91.48.22 port 56740 |
2019-11-17 19:17:44 |
42.117.47.124 | attack | Telnet/23 MH Probe, BF, Hack - |
2019-11-17 19:41:07 |
173.201.196.114 | attackspam | Automatic report - XMLRPC Attack |
2019-11-17 19:17:11 |
96.64.194.75 | attackbots | SSH Bruteforce |
2019-11-17 19:21:32 |
93.144.35.78 | attackbots | SSH Bruteforce |
2019-11-17 19:34:26 |
157.45.103.44 | attackspambots | Unauthorised access (Nov 17) SRC=157.45.103.44 LEN=48 TOS=0x08 PREC=0x20 TTL=108 ID=13833 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-17 19:19:26 |
31.147.204.65 | attackspambots | SSH Bruteforce |
2019-11-17 19:13:30 |
93.42.182.192 | attack | SSH Bruteforce |
2019-11-17 19:30:46 |
54.37.71.235 | attackspam | Nov 17 01:54:06 TORMINT sshd\[9022\]: Invalid user user1 from 54.37.71.235 Nov 17 01:54:06 TORMINT sshd\[9022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.71.235 Nov 17 01:54:07 TORMINT sshd\[9022\]: Failed password for invalid user user1 from 54.37.71.235 port 51237 ssh2 ... |
2019-11-17 19:16:50 |
90.84.241.185 | attackbots | SSH Bruteforce |
2019-11-17 19:41:56 |
174.138.14.220 | attack | 11/17/2019-12:22:50.501810 174.138.14.220 Protocol: 6 ET POLICY Cleartext WordPress Login |
2019-11-17 19:25:07 |
198.16.78.178 | attackspam | Automatic report - XMLRPC Attack |
2019-11-17 19:41:27 |
91.121.136.44 | attack | Nov 17 07:47:40 firewall sshd[24610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.136.44 Nov 17 07:47:40 firewall sshd[24610]: Invalid user deploy from 91.121.136.44 Nov 17 07:47:42 firewall sshd[24610]: Failed password for invalid user deploy from 91.121.136.44 port 58814 ssh2 ... |
2019-11-17 19:40:23 |
81.28.100.105 | attackspam | 2019-11-17T07:23:16.047962stark.klein-stark.info postfix/smtpd\[23158\]: NOQUEUE: reject: RCPT from hobbies.shrewdmhealth.com\[81.28.100.105\]: 554 5.7.1 \ |
2019-11-17 19:09:13 |