City: unknown
Region: unknown
Country: United Kingdom of Great Britain and Northern Ireland (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.142.37.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29918
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.142.37.142. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:23:54 CST 2025
;; MSG SIZE rcvd: 107
Host 142.37.142.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.37.142.134.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.13.116.203 | attack | Invalid user client from 106.13.116.203 port 37446 |
2020-05-13 14:31:48 |
| 173.82.232.193 | attack | IP: 173.82.232.193
Ports affected
Simple Mail Transfer (25)
Found in DNSBL('s)
ASN Details
AS35916 MULTA-ASN1
United States (US)
CIDR 173.82.192.0/18
Log Date: 13/05/2020 3:38:43 AM UTC |
2020-05-13 14:41:02 |
| 190.129.49.62 | attackspam | May 13 05:48:56 vps687878 sshd\[4544\]: Failed password for invalid user dsas from 190.129.49.62 port 50518 ssh2 May 13 05:52:44 vps687878 sshd\[5008\]: Invalid user user from 190.129.49.62 port 50300 May 13 05:52:44 vps687878 sshd\[5008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.129.49.62 May 13 05:52:45 vps687878 sshd\[5008\]: Failed password for invalid user user from 190.129.49.62 port 50300 ssh2 May 13 05:56:38 vps687878 sshd\[5469\]: Invalid user devhdfc from 190.129.49.62 port 50080 May 13 05:56:38 vps687878 sshd\[5469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.129.49.62 ... |
2020-05-13 14:28:51 |
| 211.106.59.232 | attackbotsspam | Unauthorized connection attempt detected from IP address 211.106.59.232 to port 82 |
2020-05-13 14:48:27 |
| 212.204.65.160 | attackbotsspam | 2020-05-13T00:46:30.0500361495-001 sshd[9783]: Invalid user deepak from 212.204.65.160 port 50924 2020-05-13T00:46:32.2076021495-001 sshd[9783]: Failed password for invalid user deepak from 212.204.65.160 port 50924 ssh2 2020-05-13T00:50:00.4288151495-001 sshd[9926]: Invalid user felicidad from 212.204.65.160 port 58406 2020-05-13T00:50:00.4320481495-001 sshd[9926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-212-204-65-160.customer.m-online.net 2020-05-13T00:50:00.4288151495-001 sshd[9926]: Invalid user felicidad from 212.204.65.160 port 58406 2020-05-13T00:50:02.7463621495-001 sshd[9926]: Failed password for invalid user felicidad from 212.204.65.160 port 58406 ssh2 ... |
2020-05-13 13:58:40 |
| 222.186.30.218 | attackbots | Unauthorized connection attempt detected from IP address 222.186.30.218 to port 22 |
2020-05-13 14:33:48 |
| 104.244.76.189 | attackbotsspam | (sshd) Failed SSH login from 104.244.76.189 (LU/Luxembourg/tor-exit-node): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 13 05:56:58 ubnt-55d23 sshd[16436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.76.189 user=root May 13 05:57:01 ubnt-55d23 sshd[16436]: Failed password for root from 104.244.76.189 port 41198 ssh2 |
2020-05-13 14:39:40 |
| 117.6.211.137 | attack | May 13 00:57:11 vps46666688 sshd[6002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.6.211.137 May 13 00:57:13 vps46666688 sshd[6002]: Failed password for invalid user guest from 117.6.211.137 port 60710 ssh2 ... |
2020-05-13 14:30:29 |
| 129.204.225.65 | attack | May 13 12:06:19 webhost01 sshd[21876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.225.65 May 13 12:06:21 webhost01 sshd[21876]: Failed password for invalid user cd from 129.204.225.65 port 53064 ssh2 ... |
2020-05-13 14:34:20 |
| 70.175.30.211 | attackbotsspam | Repeated RDP login failures. Last user: administrator |
2020-05-13 14:08:41 |
| 92.63.194.105 | attackspam | Bruteforce detected by fail2ban |
2020-05-13 14:49:14 |
| 129.204.63.100 | attack | May 13 04:31:10 scw-6657dc sshd[11452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.63.100 May 13 04:31:10 scw-6657dc sshd[11452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.63.100 May 13 04:31:12 scw-6657dc sshd[11452]: Failed password for invalid user estelle from 129.204.63.100 port 39588 ssh2 ... |
2020-05-13 14:18:51 |
| 171.25.193.78 | attack | [MK-VM4] SSH login failed |
2020-05-13 14:06:32 |
| 176.215.252.1 | attackspambots | May 13 08:31:43 debian-2gb-nbg1-2 kernel: \[11610362.907676\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=176.215.252.1 DST=195.201.40.59 LEN=40 TOS=0x10 PREC=0x60 TTL=246 ID=6603 PROTO=TCP SPT=55918 DPT=4529 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-05-13 14:38:02 |
| 35.237.32.45 | attack | May 12 23:57:31 Host-KEWR-E sshd[634]: Invalid user test from 35.237.32.45 port 37608 ... |
2020-05-13 14:14:33 |