City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.166.136.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.166.136.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 09:21:06 CST 2025
;; MSG SIZE rcvd: 108
Host 104.136.166.134.in-addr.arpa not found: 2(SERVFAIL)
server can't find 134.166.136.104.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 119.162.213.83 | attackspambots | 2019-09-15T15:20:39.148310 sshd[19699]: Invalid user pi from 119.162.213.83 port 59294 2019-09-15T15:20:39.223721 sshd[19701]: Invalid user pi from 119.162.213.83 port 59296 2019-09-15T15:20:39.529295 sshd[19699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.162.213.83 2019-09-15T15:20:39.148310 sshd[19699]: Invalid user pi from 119.162.213.83 port 59294 2019-09-15T15:20:41.184842 sshd[19699]: Failed password for invalid user pi from 119.162.213.83 port 59294 ssh2 2019-09-15T15:20:39.590101 sshd[19701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.162.213.83 2019-09-15T15:20:39.223721 sshd[19701]: Invalid user pi from 119.162.213.83 port 59296 2019-09-15T15:20:41.245466 sshd[19701]: Failed password for invalid user pi from 119.162.213.83 port 59296 ssh2 ... |
2019-09-16 01:51:27 |
| 159.65.202.125 | attack | Sep 15 15:20:34 bouncer sshd\[9688\]: Invalid user deluge from 159.65.202.125 port 47812 Sep 15 15:20:34 bouncer sshd\[9688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.202.125 Sep 15 15:20:36 bouncer sshd\[9688\]: Failed password for invalid user deluge from 159.65.202.125 port 47812 ssh2 ... |
2019-09-16 01:16:07 |
| 138.68.226.175 | attackspam | Sep 15 18:21:51 lnxded64 sshd[11997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.226.175 |
2019-09-16 01:33:26 |
| 114.108.181.139 | attackbotsspam | Sep 15 04:43:31 auw2 sshd\[2298\]: Invalid user lee from 114.108.181.139 Sep 15 04:43:31 auw2 sshd\[2298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.108.181.139 Sep 15 04:43:34 auw2 sshd\[2298\]: Failed password for invalid user lee from 114.108.181.139 port 33927 ssh2 Sep 15 04:49:28 auw2 sshd\[2852\]: Invalid user school from 114.108.181.139 Sep 15 04:49:28 auw2 sshd\[2852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.108.181.139 |
2019-09-16 01:11:55 |
| 181.29.211.17 | attackspambots | Sep 15 00:28:50 h2022099 sshd[15137]: reveeclipse mapping checking getaddrinfo for 17-211-29-181.fibertel.com.ar [181.29.211.17] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 15 00:28:50 h2022099 sshd[15137]: Invalid user users from 181.29.211.17 Sep 15 00:28:50 h2022099 sshd[15137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.29.211.17 Sep 15 00:28:52 h2022099 sshd[15137]: Failed password for invalid user users from 181.29.211.17 port 32789 ssh2 Sep 15 00:28:52 h2022099 sshd[15137]: Received disconnect from 181.29.211.17: 11: Bye Bye [preauth] Sep 15 00:36:49 h2022099 sshd[16477]: reveeclipse mapping checking getaddrinfo for 17-211-29-181.fibertel.com.ar [181.29.211.17] failed - POSSIBLE BREAK-IN ATTEMPT! Sep 15 00:36:49 h2022099 sshd[16477]: Invalid user wilsonchan from 181.29.211.17 Sep 15 00:36:49 h2022099 sshd[16477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.29.211.17 Sep........ ------------------------------- |
2019-09-16 01:37:03 |
| 37.191.232.6 | attackbots | MYH,DEF GET /shell?busybox |
2019-09-16 01:30:56 |
| 104.45.11.126 | attack | 2019-09-15T16:21:09.234703abusebot-5.cloudsearch.cf sshd\[23388\]: Invalid user hw from 104.45.11.126 port 43152 |
2019-09-16 01:46:46 |
| 51.91.251.20 | attackbots | Sep 15 07:04:46 kapalua sshd\[26294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.ip-51-91-251.eu user=root Sep 15 07:04:48 kapalua sshd\[26294\]: Failed password for root from 51.91.251.20 port 57070 ssh2 Sep 15 07:09:12 kapalua sshd\[26769\]: Invalid user samba1 from 51.91.251.20 Sep 15 07:09:12 kapalua sshd\[26769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.ip-51-91-251.eu Sep 15 07:09:14 kapalua sshd\[26769\]: Failed password for invalid user samba1 from 51.91.251.20 port 47988 ssh2 |
2019-09-16 01:15:21 |
| 138.197.162.32 | attack | Sep 15 17:22:02 bouncer sshd\[11689\]: Invalid user pepe from 138.197.162.32 port 42956 Sep 15 17:22:02 bouncer sshd\[11689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.32 Sep 15 17:22:04 bouncer sshd\[11689\]: Failed password for invalid user pepe from 138.197.162.32 port 42956 ssh2 ... |
2019-09-16 01:19:55 |
| 162.247.74.206 | attack | Sep 15 06:20:05 sachi sshd\[6864\]: Invalid user abba from 162.247.74.206 Sep 15 06:20:05 sachi sshd\[6864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=rosaluxemburg.tor-exit.calyxinstitute.org Sep 15 06:20:07 sachi sshd\[6864\]: Failed password for invalid user abba from 162.247.74.206 port 38388 ssh2 Sep 15 06:20:09 sachi sshd\[6864\]: Failed password for invalid user abba from 162.247.74.206 port 38388 ssh2 Sep 15 06:20:12 sachi sshd\[6864\]: Failed password for invalid user abba from 162.247.74.206 port 38388 ssh2 |
2019-09-16 01:38:45 |
| 117.62.213.130 | attackbots | Sep 14 23:17:13 olgosrv01 sshd[1144]: Invalid user admin from 117.62.213.130 Sep 14 23:17:13 olgosrv01 sshd[1144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.62.213.130 Sep 14 23:17:15 olgosrv01 sshd[1144]: Failed password for invalid user admin from 117.62.213.130 port 52650 ssh2 Sep 14 23:17:18 olgosrv01 sshd[1144]: Failed password for invalid user admin from 117.62.213.130 port 52650 ssh2 Sep 14 23:17:20 olgosrv01 sshd[1144]: Failed password for invalid user admin from 117.62.213.130 port 52650 ssh2 Sep 14 23:17:23 olgosrv01 sshd[1144]: Failed password for invalid user admin from 117.62.213.130 port 52650 ssh2 Sep 14 23:17:25 olgosrv01 sshd[1144]: Failed password for invalid user admin from 117.62.213.130 port 52650 ssh2 Sep 14 23:17:26 olgosrv01 sshd[1144]: Failed password for invalid user admin from 117.62.213.130 port 52650 ssh2 Sep 14 23:17:26 olgosrv01 sshd[1144]: PAM 5 more authentication failures; logname= uid=........ ------------------------------- |
2019-09-16 00:55:23 |
| 77.163.151.161 | attackspam | Sep 15 05:17:26 aiointranet sshd\[15630\]: Invalid user lk from 77.163.151.161 Sep 15 05:17:26 aiointranet sshd\[15630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip4da397a1.direct-adsl.nl Sep 15 05:17:28 aiointranet sshd\[15630\]: Failed password for invalid user lk from 77.163.151.161 port 60078 ssh2 Sep 15 05:21:46 aiointranet sshd\[16049\]: Invalid user admin from 77.163.151.161 Sep 15 05:21:46 aiointranet sshd\[16049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip4da397a1.direct-adsl.nl |
2019-09-16 00:59:15 |
| 51.77.193.213 | attackspam | k+ssh-bruteforce |
2019-09-16 01:08:26 |
| 182.16.115.130 | attackspambots | Sep 15 15:53:26 game-panel sshd[28809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.115.130 Sep 15 15:53:28 game-panel sshd[28809]: Failed password for invalid user y from 182.16.115.130 port 54082 ssh2 Sep 15 15:58:48 game-panel sshd[28973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.115.130 |
2019-09-16 01:04:21 |
| 188.166.232.14 | attackbotsspam | Sep 15 17:21:14 hcbbdb sshd\[23334\]: Invalid user doom from 188.166.232.14 Sep 15 17:21:14 hcbbdb sshd\[23334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.232.14 Sep 15 17:21:16 hcbbdb sshd\[23334\]: Failed password for invalid user doom from 188.166.232.14 port 59142 ssh2 Sep 15 17:25:55 hcbbdb sshd\[23795\]: Invalid user tabito from 188.166.232.14 Sep 15 17:25:55 hcbbdb sshd\[23795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.232.14 |
2019-09-16 01:36:29 |