City: Santa Clara
Region: California
Country: United States
Internet Service Provider: DigitalOcean LLC
Hostname: unknown
Organization: DigitalOcean, LLC
Usage Type: Data Center/Web Hosting/Transit
| Type | Details | Datetime |
|---|---|---|
| attackbotsspam | Aug 7 19:39:00 [munged] sshd[4743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.61.78 |
2019-08-08 05:32:26 |
| attackspam | 2019-07-30 18:43:04,011 fail2ban.actions [1802]: NOTICE [sshd] Ban 134.209.61.78 |
2019-07-31 07:27:31 |
| attack | Jul 30 09:40:41 aat-srv002 sshd[12008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.61.78 Jul 30 09:40:43 aat-srv002 sshd[12008]: Failed password for invalid user arbaiah from 134.209.61.78 port 52542 ssh2 Jul 30 09:45:04 aat-srv002 sshd[12084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.61.78 Jul 30 09:45:07 aat-srv002 sshd[12084]: Failed password for invalid user salenews from 134.209.61.78 port 46418 ssh2 ... |
2019-07-31 03:15:27 |
| attackbotsspam | 2019-07-26T18:36:22.121297Z 1e5c9ef3243d New connection: 134.209.61.78:59772 (172.17.0.3:2222) [session: 1e5c9ef3243d] 2019-07-26T18:48:27.807430Z 867ff86ce60d New connection: 134.209.61.78:52798 (172.17.0.3:2222) [session: 867ff86ce60d] |
2019-07-27 03:08:55 |
| attack | Jul 26 03:56:03 SilenceServices sshd[21445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.61.78 Jul 26 03:56:05 SilenceServices sshd[21445]: Failed password for invalid user guohui from 134.209.61.78 port 34878 ssh2 Jul 26 04:00:28 SilenceServices sshd[26784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.61.78 |
2019-07-26 10:19:29 |
| attack | Jul 11 16:42:37 SilenceServices sshd[432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.61.78 Jul 11 16:42:39 SilenceServices sshd[432]: Failed password for invalid user user from 134.209.61.78 port 57146 ssh2 Jul 11 16:45:58 SilenceServices sshd[3885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.61.78 |
2019-07-12 07:30:04 |
| attackspambots | Jul 5 10:03:58 Proxmox sshd\[31796\]: Invalid user jiu from 134.209.61.78 port 51878 Jul 5 10:03:58 Proxmox sshd\[31796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.61.78 Jul 5 10:04:01 Proxmox sshd\[31796\]: Failed password for invalid user jiu from 134.209.61.78 port 51878 ssh2 Jul 5 10:07:42 Proxmox sshd\[2684\]: Invalid user presta from 134.209.61.78 port 39196 Jul 5 10:07:42 Proxmox sshd\[2684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.61.78 Jul 5 10:07:45 Proxmox sshd\[2684\]: Failed password for invalid user presta from 134.209.61.78 port 39196 ssh2 |
2019-07-05 16:21:06 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 134.209.61.96 | attackspam | (smtpauth) Failed SMTP AUTH login from 134.209.61.96 (US/United States/vps.gojawa.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-23 13:02:31 login authenticator failed for vps.gojawa.net (ADMIN) [134.209.61.96]: 535 Incorrect authentication data (set_id=post@matinkimia.com) |
2020-04-23 23:06:04 |
| 134.209.61.96 | attack | (smtpauth) Failed SMTP AUTH login from 134.209.61.96 (US/United States/vps.gojawa.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-22 16:32:03 login authenticator failed for vps.gojawa.net (ADMIN) [134.209.61.96]: 535 Incorrect authentication data (set_id=oracle@matinkimia.com) |
2020-04-22 23:46:23 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.209.61.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24491
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;134.209.61.78. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019061702 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jun 18 17:59:07 CST 2019
;; MSG SIZE rcvd: 117
Host 78.61.209.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 78.61.209.134.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 61.70.2.75 | attack | Honeypot attack, port: 23, PTR: host-61-70-2-75.static.kbtelecom.net. |
2020-01-04 21:41:56 |
| 64.41.82.7 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-04 22:08:13 |
| 182.68.112.68 | attackspam | Unauthorized connection attempt from IP address 182.68.112.68 on Port 445(SMB) |
2020-01-04 21:39:18 |
| 107.170.76.170 | attackbotsspam | Jan 4 03:11:02 wbs sshd\[2583\]: Invalid user tsf from 107.170.76.170 Jan 4 03:11:02 wbs sshd\[2583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.76.170 Jan 4 03:11:04 wbs sshd\[2583\]: Failed password for invalid user tsf from 107.170.76.170 port 58477 ssh2 Jan 4 03:15:38 wbs sshd\[3013\]: Invalid user pan from 107.170.76.170 Jan 4 03:15:38 wbs sshd\[3013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.76.170 |
2020-01-04 21:42:18 |
| 62.210.80.98 | attackspam | Automatic report - Banned IP Access |
2020-01-04 21:52:20 |
| 106.54.219.195 | attackbots | Jan 4 14:39:11 localhost sshd\[3283\]: Invalid user legal from 106.54.219.195 port 49670 Jan 4 14:39:11 localhost sshd\[3283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.219.195 Jan 4 14:39:13 localhost sshd\[3283\]: Failed password for invalid user legal from 106.54.219.195 port 49670 ssh2 |
2020-01-04 21:44:06 |
| 14.165.30.106 | attack | Unauthorized connection attempt from IP address 14.165.30.106 on Port 445(SMB) |
2020-01-04 21:46:42 |
| 222.186.30.31 | attack | Jan 4 08:28:21 TORMINT sshd\[29529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.31 user=root Jan 4 08:28:24 TORMINT sshd\[29529\]: Failed password for root from 222.186.30.31 port 20902 ssh2 Jan 4 08:28:31 TORMINT sshd\[29529\]: Failed password for root from 222.186.30.31 port 20902 ssh2 ... |
2020-01-04 21:30:59 |
| 14.176.103.50 | attackbotsspam | Honeypot attack, port: 445, PTR: static.vnpt.vn. |
2020-01-04 22:13:33 |
| 113.23.44.17 | attackspambots | Unauthorized connection attempt from IP address 113.23.44.17 on Port 445(SMB) |
2020-01-04 21:58:53 |
| 190.129.47.148 | attackbotsspam | Jan 4 03:11:57 web9 sshd\[22227\]: Invalid user servicedesk from 190.129.47.148 Jan 4 03:11:57 web9 sshd\[22227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.129.47.148 Jan 4 03:11:59 web9 sshd\[22227\]: Failed password for invalid user servicedesk from 190.129.47.148 port 53550 ssh2 Jan 4 03:15:47 web9 sshd\[22806\]: Invalid user teamspeak3 from 190.129.47.148 Jan 4 03:15:47 web9 sshd\[22806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.129.47.148 |
2020-01-04 21:32:49 |
| 103.53.231.230 | attack | Unauthorized connection attempt from IP address 103.53.231.230 on Port 445(SMB) |
2020-01-04 21:50:24 |
| 14.178.144.53 | attackspambots | Unauthorized connection attempt from IP address 14.178.144.53 on Port 445(SMB) |
2020-01-04 22:12:51 |
| 118.24.23.216 | attack | Jan 4 10:15:42 vps46666688 sshd[24625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.23.216 Jan 4 10:15:44 vps46666688 sshd[24625]: Failed password for invalid user martin from 118.24.23.216 port 33524 ssh2 ... |
2020-01-04 21:37:19 |
| 159.65.144.233 | attackspam | Jan 4 14:57:39 v22018053744266470 sshd[21241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.144.233 Jan 4 14:57:42 v22018053744266470 sshd[21241]: Failed password for invalid user oracle from 159.65.144.233 port 43439 ssh2 Jan 4 14:59:56 v22018053744266470 sshd[21432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.144.233 ... |
2020-01-04 22:07:12 |