City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.106.164.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50826
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.106.164.198. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:32:30 CST 2025
;; MSG SIZE rcvd: 108
Host 198.164.106.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 198.164.106.134.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.125.65.77 | attackbotsspam | 2019-07-03T03:33:21.674000ns1.unifynetsol.net postfix/smtpd\[27626\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure 2019-07-03T04:59:32.900531ns1.unifynetsol.net postfix/smtpd\[10347\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure 2019-07-03T06:25:40.877082ns1.unifynetsol.net postfix/smtpd\[23136\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure 2019-07-03T07:52:18.531738ns1.unifynetsol.net postfix/smtpd\[31369\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure 2019-07-03T09:18:51.940242ns1.unifynetsol.net postfix/smtpd\[16608\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure |
2019-07-03 17:08:30 |
| 201.242.35.43 | attackspam | 445/tcp [2019-07-03]1pkt |
2019-07-03 17:21:01 |
| 46.175.70.69 | attack | SPF Fail sender not permitted to send mail for @mediana.net.ua / Mail sent to address obtained from MySpace hack |
2019-07-03 17:05:51 |
| 196.43.129.6 | attack | SSH bruteforce |
2019-07-03 17:31:40 |
| 45.115.6.161 | attackspambots | 8080/tcp [2019-07-03]1pkt |
2019-07-03 16:56:08 |
| 61.19.38.146 | attackbots | Jul 3 10:50:28 dev sshd\[12837\]: Invalid user ethos from 61.19.38.146 port 39424 Jul 3 10:50:28 dev sshd\[12837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.19.38.146 Jul 3 10:50:31 dev sshd\[12837\]: Failed password for invalid user ethos from 61.19.38.146 port 39424 ssh2 |
2019-07-03 16:59:56 |
| 89.234.157.254 | attack | Jul 3 10:51:37 fr01 sshd[14075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.234.157.254 user=root Jul 3 10:51:39 fr01 sshd[14075]: Failed password for root from 89.234.157.254 port 44967 ssh2 Jul 3 10:51:42 fr01 sshd[14075]: Failed password for root from 89.234.157.254 port 44967 ssh2 Jul 3 10:51:37 fr01 sshd[14075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.234.157.254 user=root Jul 3 10:51:39 fr01 sshd[14075]: Failed password for root from 89.234.157.254 port 44967 ssh2 Jul 3 10:51:42 fr01 sshd[14075]: Failed password for root from 89.234.157.254 port 44967 ssh2 Jul 3 10:51:37 fr01 sshd[14075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.234.157.254 user=root Jul 3 10:51:39 fr01 sshd[14075]: Failed password for root from 89.234.157.254 port 44967 ssh2 Jul 3 10:51:42 fr01 sshd[14075]: Failed password for root from 89.234.157.254 port 44967 ssh2 Jul 3 10: |
2019-07-03 17:11:40 |
| 82.209.209.32 | attackbotsspam | imap. Unknown user |
2019-07-03 17:15:50 |
| 190.60.221.202 | attackspambots | Jul 3 05:03:25 ***** sshd[14799]: User root from 190.60.221.202 not allowed because not listed in AllowUsers |
2019-07-03 17:25:04 |
| 198.108.66.244 | attackbots | 3389BruteforceFW23 |
2019-07-03 17:40:30 |
| 190.104.40.155 | attack | imap. Unknown user |
2019-07-03 17:17:29 |
| 200.172.91.170 | attack | 2019-07-03T10:38:16.464156lon01.zurich-datacenter.net sshd\[4191\]: Invalid user rancid from 200.172.91.170 port 55575 2019-07-03T10:38:16.470468lon01.zurich-datacenter.net sshd\[4191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.172.91.170 2019-07-03T10:38:18.218679lon01.zurich-datacenter.net sshd\[4191\]: Failed password for invalid user rancid from 200.172.91.170 port 55575 ssh2 2019-07-03T10:45:07.812553lon01.zurich-datacenter.net sshd\[4350\]: Invalid user biz from 200.172.91.170 port 53165 2019-07-03T10:45:07.819285lon01.zurich-datacenter.net sshd\[4350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.172.91.170 ... |
2019-07-03 16:55:35 |
| 219.92.25.164 | attackbotsspam | port scan and connect, tcp 23 (telnet) |
2019-07-03 16:55:16 |
| 45.195.86.10 | attackbots | Jul 3 11:18:16 mail sshd\[3243\]: Invalid user neneng from 45.195.86.10 port 33694 Jul 3 11:18:16 mail sshd\[3243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.195.86.10 Jul 3 11:18:17 mail sshd\[3243\]: Failed password for invalid user neneng from 45.195.86.10 port 33694 ssh2 Jul 3 11:20:45 mail sshd\[3702\]: Invalid user sysadmin from 45.195.86.10 port 58906 Jul 3 11:20:45 mail sshd\[3702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.195.86.10 |
2019-07-03 17:26:21 |
| 123.11.168.175 | attack | 23/tcp [2019-07-03]1pkt |
2019-07-03 17:15:30 |