City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.200.81.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19498
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.200.81.132. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 17:22:22 CST 2025
;; MSG SIZE rcvd: 107
Host 132.81.200.134.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 132.81.200.134.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 138.197.162.32 | attackbotsspam | Feb 26 07:39:46 askasleikir sshd[138713]: Failed password for invalid user workshop from 138.197.162.32 port 35966 ssh2 |
2020-02-26 22:24:11 |
| 217.182.253.230 | attackbotsspam | $f2bV_matches |
2020-02-26 22:06:13 |
| 46.100.62.185 | attackbotsspam | suspicious action Wed, 26 Feb 2020 10:38:06 -0300 |
2020-02-26 22:24:53 |
| 177.71.34.178 | attack | Automatic report - Port Scan Attack |
2020-02-26 22:02:06 |
| 103.98.30.72 | attackbots | Attempt to hack Wordpress Login, XMLRPC or other login |
2020-02-26 22:30:32 |
| 217.182.79.118 | attack | $f2bV_matches |
2020-02-26 22:02:58 |
| 213.82.88.181 | attackbotsspam | $f2bV_matches |
2020-02-26 22:34:59 |
| 217.19.154.219 | attackspambots | $f2bV_matches |
2020-02-26 21:57:30 |
| 106.13.136.73 | attack | web-1 [ssh] SSH Attack |
2020-02-26 22:00:24 |
| 217.11.184.26 | attackspam | $f2bV_matches |
2020-02-26 22:19:47 |
| 213.91.179.246 | attackbotsspam | $f2bV_matches |
2020-02-26 22:34:14 |
| 61.153.237.123 | attack | suspicious action Wed, 26 Feb 2020 10:38:16 -0300 |
2020-02-26 22:11:07 |
| 218.92.0.171 | attackbotsspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171 user=root Failed password for root from 218.92.0.171 port 62879 ssh2 Failed password for root from 218.92.0.171 port 62879 ssh2 Failed password for root from 218.92.0.171 port 62879 ssh2 Failed password for root from 218.92.0.171 port 62879 ssh2 |
2020-02-26 22:00:57 |
| 217.182.206.141 | attackbotsspam | $f2bV_matches |
2020-02-26 22:08:45 |
| 216.10.245.5 | attack | $f2bV_matches |
2020-02-26 22:26:44 |