City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.39.105.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.39.105.127. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 14:33:45 CST 2025
;; MSG SIZE rcvd: 107
Host 127.105.39.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 127.105.39.134.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
96.69.246.61 | attack | Invalid user ftpuser from 96.69.246.61 port 16267 |
2020-05-14 06:49:30 |
64.227.58.213 | attack | May 13 16:39:30 server1 sshd\[15028\]: Failed password for root from 64.227.58.213 port 58090 ssh2 May 13 16:43:28 server1 sshd\[16760\]: Invalid user syftp from 64.227.58.213 May 13 16:43:28 server1 sshd\[16760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.58.213 May 13 16:43:30 server1 sshd\[16760\]: Failed password for invalid user syftp from 64.227.58.213 port 39508 ssh2 May 13 16:47:19 server1 sshd\[18374\]: Invalid user deploy from 64.227.58.213 ... |
2020-05-14 06:47:55 |
50.254.86.98 | attack | bruteforce detected |
2020-05-14 06:16:26 |
51.137.145.162 | attackbotsspam | May 14 00:06:25 PorscheCustomer sshd[3820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.137.145.162 May 14 00:06:27 PorscheCustomer sshd[3820]: Failed password for invalid user user5 from 51.137.145.162 port 51898 ssh2 May 14 00:10:09 PorscheCustomer sshd[3997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.137.145.162 ... |
2020-05-14 06:12:59 |
165.22.69.147 | attackbots | May 14 00:25:56 PorscheCustomer sshd[4721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.69.147 May 14 00:25:58 PorscheCustomer sshd[4721]: Failed password for invalid user le from 165.22.69.147 port 44106 ssh2 May 14 00:30:12 PorscheCustomer sshd[4848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.69.147 ... |
2020-05-14 06:33:53 |
142.93.68.181 | attackspam | May 13 18:55:18 : SSH login attempts with invalid user |
2020-05-14 06:48:33 |
181.58.120.115 | attackbotsspam | May 14 00:27:07 buvik sshd[23862]: Invalid user vr from 181.58.120.115 May 14 00:27:07 buvik sshd[23862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.58.120.115 May 14 00:27:09 buvik sshd[23862]: Failed password for invalid user vr from 181.58.120.115 port 49496 ssh2 ... |
2020-05-14 06:44:45 |
103.109.178.176 | attackspambots | Autoban 103.109.178.176 AUTH/CONNECT |
2020-05-14 06:45:25 |
35.198.119.117 | attackspam | Invalid user spring from 35.198.119.117 port 39180 |
2020-05-14 06:13:26 |
194.135.166.225 | attackspam | [Wed May 13 21:45:11 2020] - Syn Flood From IP: 194.135.166.225 Port: 25922 |
2020-05-14 06:15:42 |
196.15.211.91 | attack | May 13 16:36:27 : SSH login attempts with invalid user |
2020-05-14 06:39:49 |
51.83.45.65 | attack | May 14 00:14:52 vps639187 sshd\[31874\]: Invalid user zym from 51.83.45.65 port 41042 May 14 00:14:52 vps639187 sshd\[31874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.45.65 May 14 00:14:54 vps639187 sshd\[31874\]: Failed password for invalid user zym from 51.83.45.65 port 41042 ssh2 ... |
2020-05-14 06:21:34 |
152.67.47.139 | attackbotsspam | May 14 00:11:16 jane sshd[3053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.67.47.139 May 14 00:11:18 jane sshd[3053]: Failed password for invalid user vegeta from 152.67.47.139 port 49084 ssh2 ... |
2020-05-14 06:31:53 |
122.51.49.32 | attackbots | May 13 22:08:51 ip-172-31-61-156 sshd[30976]: Failed password for invalid user vegeta from 122.51.49.32 port 48658 ssh2 May 13 22:08:49 ip-172-31-61-156 sshd[30976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.49.32 May 13 22:08:49 ip-172-31-61-156 sshd[30976]: Invalid user vegeta from 122.51.49.32 May 13 22:08:51 ip-172-31-61-156 sshd[30976]: Failed password for invalid user vegeta from 122.51.49.32 port 48658 ssh2 May 13 22:14:41 ip-172-31-61-156 sshd[31280]: Invalid user adm from 122.51.49.32 ... |
2020-05-14 06:22:43 |
128.199.169.211 | attack | Invalid user mo from 128.199.169.211 port 34516 |
2020-05-14 06:45:00 |