City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.42.192.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61260
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.42.192.252. IN A
;; AUTHORITY SECTION:
. 108 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022051702 1800 900 604800 86400
;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 18 07:51:32 CST 2022
;; MSG SIZE rcvd: 107
b'Host 252.192.42.134.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 134.42.192.252.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
177.158.147.191 | attack | Automatic report - Port Scan Attack |
2020-01-15 05:36:28 |
177.38.165.131 | attackspam | Dec 26 11:14:13 odroid64 sshd\[11839\]: User root from 177.38.165.131 not allowed because not listed in AllowUsers Dec 26 11:14:13 odroid64 sshd\[11839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.38.165.131 user=root ... |
2020-01-15 05:16:49 |
49.235.6.213 | attackbots | SSH/22 MH Probe, BF, Hack - |
2020-01-15 05:42:16 |
188.254.173.46 | attackbots | Unauthorized connection attempt detected from IP address 188.254.173.46 to port 4567 |
2020-01-15 05:10:06 |
60.191.38.77 | attackbots | Unauthorised access (Jan 14) SRC=60.191.38.77 LEN=44 TTL=114 ID=13567 TCP DPT=8080 WINDOW=29200 SYN |
2020-01-15 05:34:52 |
41.63.0.133 | attackspambots | Jan 14 22:17:39 dedicated sshd[29998]: Invalid user odoo from 41.63.0.133 port 52786 |
2020-01-15 05:29:47 |
211.252.87.90 | attackspambots | Jan 14 16:14:34 ny01 sshd[16722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.87.90 Jan 14 16:14:37 ny01 sshd[16722]: Failed password for invalid user ehkwon from 211.252.87.90 port 59636 ssh2 Jan 14 16:17:42 ny01 sshd[17019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.87.90 |
2020-01-15 05:25:58 |
185.176.27.122 | attack | 01/14/2020-16:32:47.608322 185.176.27.122 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-01-15 05:39:09 |
222.186.30.31 | attack | Jan 14 22:17:47 tuxlinux sshd[39276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.31 user=root ... |
2020-01-15 05:23:15 |
37.139.13.105 | attackbotsspam | Jan 14 22:16:25 v22018053744266470 sshd[2464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105 Jan 14 22:16:27 v22018053744266470 sshd[2464]: Failed password for invalid user vmadmin from 37.139.13.105 port 52106 ssh2 Jan 14 22:17:22 v22018053744266470 sshd[2531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.13.105 ... |
2020-01-15 05:40:52 |
186.167.18.122 | attack | Unauthorized connection attempt detected from IP address 186.167.18.122 to port 2220 [J] |
2020-01-15 05:36:12 |
212.64.21.78 | attackbots | Jan 15 00:10:41 server sshd\[2318\]: Invalid user dert from 212.64.21.78 Jan 15 00:10:41 server sshd\[2318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.21.78 Jan 15 00:10:42 server sshd\[2318\]: Failed password for invalid user dert from 212.64.21.78 port 3894 ssh2 Jan 15 00:18:38 server sshd\[4032\]: Invalid user user2 from 212.64.21.78 Jan 15 00:18:38 server sshd\[4032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.21.78 ... |
2020-01-15 05:46:19 |
185.165.168.229 | attack | Invalid user admin from 185.165.168.229 port 51948 |
2020-01-15 05:12:04 |
222.186.15.166 | attack | Jan 14 22:23:07 vmanager6029 sshd\[19601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166 user=root Jan 14 22:23:09 vmanager6029 sshd\[19601\]: Failed password for root from 222.186.15.166 port 25213 ssh2 Jan 14 22:23:11 vmanager6029 sshd\[19601\]: Failed password for root from 222.186.15.166 port 25213 ssh2 |
2020-01-15 05:24:58 |
218.92.0.205 | attackspam | Jan 14 21:10:45 zeus sshd[1709]: Failed password for root from 218.92.0.205 port 20166 ssh2 Jan 14 21:10:49 zeus sshd[1709]: Failed password for root from 218.92.0.205 port 20166 ssh2 Jan 14 21:10:53 zeus sshd[1709]: Failed password for root from 218.92.0.205 port 20166 ssh2 Jan 14 21:17:30 zeus sshd[1781]: Failed password for root from 218.92.0.205 port 46623 ssh2 |
2020-01-15 05:33:44 |