City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.197.198.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35236
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.197.198.29. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 00:37:12 CST 2025
;; MSG SIZE rcvd: 107
29.198.197.134.in-addr.arpa domain name pointer rs-dc-fw-v1981.scsr.nevada.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
29.198.197.134.in-addr.arpa name = rs-dc-fw-v1981.scsr.nevada.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
138.36.107.73 | attackspambots | Aug 19 16:01:09 www2 sshd\[42725\]: Invalid user night from 138.36.107.73Aug 19 16:01:11 www2 sshd\[42725\]: Failed password for invalid user night from 138.36.107.73 port 54668 ssh2Aug 19 16:06:14 www2 sshd\[43294\]: Invalid user tools from 138.36.107.73 ... |
2019-08-19 21:11:04 |
95.188.79.135 | attackbots | SMB Server BruteForce Attack |
2019-08-19 21:50:24 |
181.56.69.226 | attackbotsspam | Aug 19 13:23:09 eventyay sshd[20916]: Failed password for root from 181.56.69.226 port 37410 ssh2 Aug 19 13:27:39 eventyay sshd[21079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.56.69.226 Aug 19 13:27:41 eventyay sshd[21079]: Failed password for invalid user derby from 181.56.69.226 port 53474 ssh2 ... |
2019-08-19 21:17:31 |
176.31.253.55 | attackspam | Aug 19 07:26:31 hb sshd\[763\]: Invalid user joe from 176.31.253.55 Aug 19 07:26:31 hb sshd\[763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns388274.ip-176-31-253.eu Aug 19 07:26:33 hb sshd\[763\]: Failed password for invalid user joe from 176.31.253.55 port 52936 ssh2 Aug 19 07:36:21 hb sshd\[1690\]: Invalid user verner from 176.31.253.55 Aug 19 07:36:21 hb sshd\[1690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns388274.ip-176-31-253.eu |
2019-08-19 21:32:27 |
188.166.7.134 | attackbots | Aug 19 13:07:01 amit sshd\[2418\]: Invalid user nevin from 188.166.7.134 Aug 19 13:07:01 amit sshd\[2418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.7.134 Aug 19 13:07:03 amit sshd\[2418\]: Failed password for invalid user nevin from 188.166.7.134 port 44872 ssh2 ... |
2019-08-19 21:33:24 |
66.206.0.173 | attackspambots | [portscan] Port scan |
2019-08-19 21:39:05 |
142.91.157.88 | attackspambots | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-08-19 21:55:02 |
200.211.250.195 | attack | Aug 19 13:24:35 game-panel sshd[22509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.211.250.195 Aug 19 13:24:37 game-panel sshd[22509]: Failed password for invalid user te from 200.211.250.195 port 47454 ssh2 Aug 19 13:29:53 game-panel sshd[22781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.211.250.195 |
2019-08-19 21:31:18 |
51.68.70.72 | attackbotsspam | Aug 19 01:46:31 auw2 sshd\[14884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.ip-51-68-70.eu user=root Aug 19 01:46:33 auw2 sshd\[14884\]: Failed password for root from 51.68.70.72 port 54770 ssh2 Aug 19 01:50:42 auw2 sshd\[15202\]: Invalid user waredox from 51.68.70.72 Aug 19 01:50:42 auw2 sshd\[15202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.ip-51-68-70.eu Aug 19 01:50:45 auw2 sshd\[15202\]: Failed password for invalid user waredox from 51.68.70.72 port 44602 ssh2 |
2019-08-19 22:07:23 |
175.30.123.177 | attackspambots | port scan and connect, tcp 23 (telnet) |
2019-08-19 22:03:39 |
138.186.115.239 | attack | $f2bV_matches |
2019-08-19 21:10:02 |
35.228.227.122 | attackspambots | Aug 19 09:35:52 vps01 sshd[13418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.228.227.122 Aug 19 09:35:53 vps01 sshd[13418]: Failed password for invalid user foo from 35.228.227.122 port 59280 ssh2 |
2019-08-19 22:09:04 |
201.91.132.170 | attackspambots | Multiple SSH auth failures recorded by fail2ban |
2019-08-19 21:28:43 |
158.69.148.61 | attack | Aug 19 15:24:14 v22018076622670303 sshd\[7171\]: Invalid user cuan from 158.69.148.61 port 48468 Aug 19 15:24:14 v22018076622670303 sshd\[7171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.148.61 Aug 19 15:24:17 v22018076622670303 sshd\[7171\]: Failed password for invalid user cuan from 158.69.148.61 port 48468 ssh2 ... |
2019-08-19 21:34:25 |
91.122.100.215 | attack | mail auth brute force |
2019-08-19 21:52:29 |