City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.8.205.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26592
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.8.205.162. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 02:21:05 CST 2025
;; MSG SIZE rcvd: 106
Host 162.205.8.134.in-addr.arpa not found: 2(SERVFAIL)
server can't find 134.8.205.162.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 118.163.34.206 | attackspam | Attempted to establish connection to non opened port 9530 |
2020-08-08 01:29:37 |
| 188.217.9.63 | attackspambots | Automatic report - Port Scan Attack |
2020-08-08 01:12:32 |
| 103.146.23.176 | attackbots | Probing for vulnerable services |
2020-08-08 01:22:26 |
| 47.99.131.175 | attackspam | Hit honeypot r. |
2020-08-08 01:18:12 |
| 207.188.84.69 | attackspambots | RDP Bruteforce |
2020-08-08 01:51:48 |
| 194.225.185.29 | attackspambots | Attempted to establish connection to non opened port 1433 |
2020-08-08 01:27:25 |
| 104.200.20.46 | attackspambots | xmlrpc attack |
2020-08-08 01:15:07 |
| 194.26.29.14 | attack | [H1.VM4] Blocked by UFW |
2020-08-08 01:15:38 |
| 5.196.75.47 | attack | $f2bV_matches |
2020-08-08 01:43:55 |
| 116.247.108.10 | attackspam | Aug 4 04:48:04 ovpn sshd[32393]: Bad protocol version identification '-HSS2.0-libssh-0.6.3' from 116.247.108.10 port 39784 Aug 6 18:21:51 ovpn sshd[8596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.108.10 user=r.r Aug 6 18:21:53 ovpn sshd[8596]: Failed password for r.r from 116.247.108.10 port 52918 ssh2 Aug 6 18:21:54 ovpn sshd[8596]: Received disconnect from 116.247.108.10 port 52918:11: Bye Bye [preauth] Aug 6 18:21:54 ovpn sshd[8596]: Disconnected from 116.247.108.10 port 52918 [preauth] Aug 6 18:47:01 ovpn sshd[26170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.108.10 user=r.r Aug 6 18:47:04 ovpn sshd[26170]: Failed password for r.r from 116.247.108.10 port 49120 ssh2 Aug 6 18:47:04 ovpn sshd[26170]: Received disconnect from 116.247.108.10 port 49120:11: Bye Bye [preauth] Aug 6 18:47:04 ovpn sshd[26170]: Disconnected from 116.247.108.10 port 49120 [pr........ ------------------------------ |
2020-08-08 01:17:41 |
| 148.69.64.2 | attackspambots | Unauthorized connection attempt from IP address 148.69.64.2 on Port 445(SMB) |
2020-08-08 01:47:12 |
| 103.61.255.39 | attack | Unauthorized connection attempt from IP address 103.61.255.39 on Port 445(SMB) |
2020-08-08 01:52:05 |
| 186.30.58.56 | attackspam | Aug 7 15:06:07 rocket sshd[29806]: Failed password for root from 186.30.58.56 port 56786 ssh2 Aug 7 15:11:03 rocket sshd[30624]: Failed password for root from 186.30.58.56 port 40208 ssh2 ... |
2020-08-08 01:48:58 |
| 106.54.141.45 | attackbotsspam | 2020-08-07T13:57:33.534826amanda2.illicoweb.com sshd\[42468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.45 user=root 2020-08-07T13:57:35.732832amanda2.illicoweb.com sshd\[42468\]: Failed password for root from 106.54.141.45 port 38796 ssh2 2020-08-07T14:00:07.438217amanda2.illicoweb.com sshd\[42863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.45 user=root 2020-08-07T14:00:09.443967amanda2.illicoweb.com sshd\[42863\]: Failed password for root from 106.54.141.45 port 47216 ssh2 2020-08-07T14:02:53.648849amanda2.illicoweb.com sshd\[43392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.45 user=root ... |
2020-08-08 01:43:15 |
| 51.161.32.211 | attack | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root |
2020-08-08 01:52:37 |