City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.71.34.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37775
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.71.34.60. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 09:58:55 CST 2025
;; MSG SIZE rcvd: 105
60.34.71.134.in-addr.arpa has no PTR record
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
*** Can't find 60.34.71.134.in-addr.arpa.: No answer
Authoritative answers can be found from:
71.134.in-addr.arpa
origin = dnsa-01.unx.cpp.edu
mail addr = domainadmin.cpp.edu
serial = 1
refresh = 7200
retry = 900
expire = 1209600
minimum = 10800
IP | Type | Details | Datetime |
---|---|---|---|
186.1.214.248 | attackbots | (smtpauth) Failed SMTP AUTH login from 186.1.214.248 (AR/Argentina/hostCRS07248.redcrs.com.ar): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-05 08:28:40 plain authenticator failed for hostcrs07248.redcrs.com.ar [186.1.214.248]: 535 Incorrect authentication data (set_id=engineer) |
2020-06-05 12:16:43 |
222.95.134.120 | attack | Jun 5 05:49:41 home sshd[23899]: Failed password for root from 222.95.134.120 port 53416 ssh2 Jun 5 05:57:13 home sshd[24663]: Failed password for root from 222.95.134.120 port 56776 ssh2 ... |
2020-06-05 12:15:00 |
46.23.134.70 | attackbots | (CZ/Czechia/-) SMTP Bruteforcing attempts |
2020-06-05 12:22:55 |
59.26.23.148 | attack | Jun 5 05:54:31 jane sshd[2791]: Failed password for root from 59.26.23.148 port 49606 ssh2 ... |
2020-06-05 12:27:48 |
46.21.212.79 | attackspam | (PL/Poland/-) SMTP Bruteforcing attempts |
2020-06-05 12:29:51 |
151.248.63.134 | attack | Suspicious access to SMTP/POP/IMAP services. |
2020-06-05 12:22:04 |
201.47.158.130 | attackbotsspam | 20 attempts against mh-ssh on cloud |
2020-06-05 12:34:16 |
49.233.77.12 | attack | $f2bV_matches |
2020-06-05 12:29:35 |
117.30.140.197 | attackspam | 2020-06-05 12:49:16 | |
167.71.196.176 | attackbotsspam | Jun 5 05:40:01 sip sshd[14540]: Failed password for root from 167.71.196.176 port 46214 ssh2 Jun 5 05:53:08 sip sshd[19291]: Failed password for root from 167.71.196.176 port 59600 ssh2 |
2020-06-05 12:38:42 |
34.67.145.173 | attackspambots | 20 attempts against mh-ssh on echoip |
2020-06-05 12:17:13 |
46.232.129.20 | attackbots | (PL/Poland/-) SMTP Bruteforcing attempts |
2020-06-05 12:18:23 |
46.23.136.21 | attack | (CZ/Czechia/-) SMTP Bruteforcing attempts |
2020-06-05 12:20:14 |
114.119.164.50 | attackspam | Automatic report - Banned IP Access |
2020-06-05 12:40:33 |
49.89.134.6 | attackspambots | Icarus honeypot on github |
2020-06-05 12:25:21 |