City: Wahpeton
Region: North Dakota
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.129.45.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25358
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.129.45.82. IN A
;; AUTHORITY SECTION:
. 598 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020022801 1800 900 604800 86400
;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 29 05:43:32 CST 2020
;; MSG SIZE rcvd: 117
82.45.129.134.in-addr.arpa domain name pointer dhcp45-82.ndscs.nodak.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
82.45.129.134.in-addr.arpa name = dhcp45-82.ndscs.nodak.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
58.56.161.52 | attack | 2020-02-17T03:15:14.814Z CLOSE host=58.56.161.52 port=37323 fd=4 time=20.011 bytes=27 ... |
2020-03-13 02:52:40 |
52.53.225.225 | attackbotsspam | 2020-03-06T12:43:34.567Z CLOSE host=52.53.225.225 port=56246 fd=4 time=30.008 bytes=35 ... |
2020-03-13 03:00:12 |
5.34.131.72 | attack | $f2bV_matches |
2020-03-13 02:42:37 |
61.177.172.128 | attackspam | Mar 13 02:19:26 bacztwo sshd[26508]: error: PAM: Authentication failure for root from 61.177.172.128 Mar 13 02:19:30 bacztwo sshd[26508]: error: PAM: Authentication failure for root from 61.177.172.128 Mar 13 02:19:33 bacztwo sshd[26508]: error: PAM: Authentication failure for root from 61.177.172.128 Mar 13 02:19:33 bacztwo sshd[26508]: Failed keyboard-interactive/pam for root from 61.177.172.128 port 49044 ssh2 Mar 13 02:19:23 bacztwo sshd[26508]: error: PAM: Authentication failure for root from 61.177.172.128 Mar 13 02:19:26 bacztwo sshd[26508]: error: PAM: Authentication failure for root from 61.177.172.128 Mar 13 02:19:30 bacztwo sshd[26508]: error: PAM: Authentication failure for root from 61.177.172.128 Mar 13 02:19:33 bacztwo sshd[26508]: error: PAM: Authentication failure for root from 61.177.172.128 Mar 13 02:19:33 bacztwo sshd[26508]: Failed keyboard-interactive/pam for root from 61.177.172.128 port 49044 ssh2 Mar 13 02:19:36 bacztwo sshd[26508]: error: PAM: Authentication f ... |
2020-03-13 02:38:17 |
62.2.86.48 | attack | 2020-01-29T15:04:01.720Z CLOSE host=62.2.86.48 port=44545 fd=4 time=40.031 bytes=33 ... |
2020-03-13 02:28:04 |
61.133.238.106 | attackbotsspam | Unauthorized connection attempt detected from IP address 61.133.238.106 to port 22 [T] |
2020-03-13 02:42:55 |
162.222.212.46 | attackbotsspam | Mar 12 13:25:27 aragorn sshd[3954]: Invalid user oracle from 162.222.212.46 Mar 12 13:29:04 aragorn sshd[3998]: Invalid user ftpuser from 162.222.212.46 Mar 12 13:32:36 aragorn sshd[4913]: Invalid user eupa from 162.222.212.46 Mar 12 13:36:05 aragorn sshd[5831]: Invalid user eupa from 162.222.212.46 ... |
2020-03-13 02:28:23 |
61.49.82.86 | attack | 2020-01-11T05:06:14.204Z CLOSE host=61.49.82.86 port=45081 fd=4 time=20.020 bytes=8 ... |
2020-03-13 02:34:55 |
103.212.211.164 | attackbots | DATE:2020-03-12 16:23:00, IP:103.212.211.164, PORT:ssh SSH brute force auth (docker-dc) |
2020-03-13 02:25:28 |
114.199.22.52 | attackspambots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-03-13 02:32:57 |
60.52.144.90 | attackspambots | 2019-11-26T14:01:33.043Z CLOSE host=60.52.144.90 port=16802 fd=4 time=950.722 bytes=1646 ... |
2020-03-13 02:43:29 |
200.187.173.124 | attack | Unauthorized connection attempt from IP address 200.187.173.124 on Port 445(SMB) |
2020-03-13 02:49:17 |
211.75.136.205 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-03-13 03:00:44 |
120.237.46.74 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-03-13 02:37:54 |
59.152.110.221 | attackbotsspam | 2020-02-15T03:24:25.875Z CLOSE host=59.152.110.221 port=19157 fd=4 time=20.017 bytes=32 ... |
2020-03-13 02:46:02 |