City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.207.140.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55825
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.207.140.242. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019042401 1800 900 604800 86400
;; Query time: 4 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 25 12:09:24 +08 2019
;; MSG SIZE rcvd: 119
Host 242.140.207.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.3
Address: 67.207.67.3#53
** server can't find 242.140.207.134.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
95.85.193.66 | attackbots | Unauthorized connection attempt from IP address 95.85.193.66 on Port 445(SMB) |
2019-11-04 07:13:54 |
187.32.178.33 | attackspambots | Nov 3 22:43:04 web8 sshd\[5814\]: Invalid user aime from 187.32.178.33 Nov 3 22:43:04 web8 sshd\[5814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.32.178.33 Nov 3 22:43:06 web8 sshd\[5814\]: Failed password for invalid user aime from 187.32.178.33 port 4444 ssh2 Nov 3 22:47:25 web8 sshd\[7818\]: Invalid user scootah from 187.32.178.33 Nov 3 22:47:25 web8 sshd\[7818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.32.178.33 |
2019-11-04 07:01:28 |
139.213.74.140 | attack | firewall-block, port(s): 8080/tcp |
2019-11-04 07:05:14 |
89.91.69.181 | attack | Nov 4 00:46:20 www sshd\[184247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.91.69.181 user=root Nov 4 00:46:21 www sshd\[184247\]: Failed password for root from 89.91.69.181 port 49442 ssh2 Nov 4 00:50:25 www sshd\[184267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.91.69.181 user=root ... |
2019-11-04 07:11:55 |
182.140.235.120 | attack | firewall-block, port(s): 1433/tcp |
2019-11-04 07:01:43 |
218.73.96.183 | attack | Unauthorized connection attempt from IP address 218.73.96.183 on Port 445(SMB) |
2019-11-04 07:23:27 |
188.162.132.108 | attackspam | Unauthorized connection attempt from IP address 188.162.132.108 on Port 445(SMB) |
2019-11-04 06:55:16 |
27.254.137.144 | attackspambots | Nov 3 22:43:38 hcbbdb sshd\[9376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.137.144 user=root Nov 3 22:43:40 hcbbdb sshd\[9376\]: Failed password for root from 27.254.137.144 port 57446 ssh2 Nov 3 22:47:58 hcbbdb sshd\[9835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.137.144 user=root Nov 3 22:48:00 hcbbdb sshd\[9835\]: Failed password for root from 27.254.137.144 port 43282 ssh2 Nov 3 22:52:17 hcbbdb sshd\[10282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.137.144 user=root |
2019-11-04 06:56:29 |
159.203.81.28 | attack | Nov 3 23:37:37 vps647732 sshd[10051]: Failed password for root from 159.203.81.28 port 53097 ssh2 ... |
2019-11-04 06:49:19 |
180.250.205.114 | attackbots | 2019-11-03T22:21:12.867836hub.schaetter.us sshd\[5867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.205.114 user=root 2019-11-03T22:21:14.552628hub.schaetter.us sshd\[5867\]: Failed password for root from 180.250.205.114 port 43095 ssh2 2019-11-03T22:25:46.233603hub.schaetter.us sshd\[5907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.205.114 user=root 2019-11-03T22:25:48.866849hub.schaetter.us sshd\[5907\]: Failed password for root from 180.250.205.114 port 34230 ssh2 2019-11-03T22:30:21.949448hub.schaetter.us sshd\[5925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.205.114 user=root ... |
2019-11-04 07:08:40 |
14.140.207.62 | attack | Unauthorized connection attempt from IP address 14.140.207.62 on Port 445(SMB) |
2019-11-04 06:58:39 |
180.66.207.67 | attackbots | Nov 3 17:44:17 ny01 sshd[15309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.66.207.67 Nov 3 17:44:20 ny01 sshd[15309]: Failed password for invalid user zxqqy from 180.66.207.67 port 53668 ssh2 Nov 3 17:49:00 ny01 sshd[15756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.66.207.67 |
2019-11-04 06:52:23 |
217.128.195.71 | attackspambots | CloudCIX Reconnaissance Scan Detected, PTR: lstlambert-658-1-104-71.w217-128.abo.wanadoo.fr. |
2019-11-04 07:04:18 |
36.26.253.27 | attackspam | SpamReport |
2019-11-04 07:26:12 |
165.225.72.202 | attackspambots | Unauthorized connection attempt from IP address 165.225.72.202 on Port 445(SMB) |
2019-11-04 07:04:00 |