City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.85.187.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.85.187.31. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 20:45:49 CST 2025
;; MSG SIZE rcvd: 106
31.187.85.134.in-addr.arpa domain name pointer nothing.attdns.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
31.187.85.134.in-addr.arpa name = nothing.attdns.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
175.4.219.192 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-22 13:28:04 |
120.6.178.223 | attack | Honeypot attack, port: 23, PTR: PTR record not found |
2019-12-22 13:31:21 |
35.240.253.241 | attack | Dec 21 18:54:04 web1 sshd\[30341\]: Invalid user takirrah from 35.240.253.241 Dec 21 18:54:04 web1 sshd\[30341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.240.253.241 Dec 21 18:54:06 web1 sshd\[30341\]: Failed password for invalid user takirrah from 35.240.253.241 port 52232 ssh2 Dec 21 18:59:58 web1 sshd\[30928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.240.253.241 user=root Dec 21 19:00:00 web1 sshd\[30928\]: Failed password for root from 35.240.253.241 port 56972 ssh2 |
2019-12-22 13:08:12 |
221.157.203.236 | attack | Honeypot attack, port: 23, PTR: PTR record not found |
2019-12-22 13:08:28 |
121.66.252.158 | attack | SSH Brute-Force reported by Fail2Ban |
2019-12-22 13:38:14 |
186.211.2.54 | attackbotsspam | spam |
2019-12-22 13:41:48 |
203.147.64.147 | attackspambots | ILLEGAL ACCESS imap |
2019-12-22 13:22:09 |
187.178.64.209 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-22 13:06:57 |
95.250.107.194 | attack | Honeypot attack, port: 5555, PTR: host194-107-dynamic.250-95-r.retail.telecomitalia.it. |
2019-12-22 13:20:03 |
139.255.87.213 | attackspam | Dec 21 19:07:51 wbs sshd\[19249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.255.87.213 user=root Dec 21 19:07:53 wbs sshd\[19249\]: Failed password for root from 139.255.87.213 port 56798 ssh2 Dec 21 19:16:16 wbs sshd\[20115\]: Invalid user user from 139.255.87.213 Dec 21 19:16:16 wbs sshd\[20115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.255.87.213 Dec 21 19:16:18 wbs sshd\[20115\]: Failed password for invalid user user from 139.255.87.213 port 33718 ssh2 |
2019-12-22 13:19:14 |
185.215.63.197 | attackbotsspam | Honeypot attack, port: 23, PTR: E4186B01C4FD.mldns.ru. |
2019-12-22 13:23:12 |
201.72.238.179 | attack | Dec 22 05:45:52 legacy sshd[2468]: Failed password for root from 201.72.238.179 port 49144 ssh2 Dec 22 05:55:03 legacy sshd[2841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.72.238.179 Dec 22 05:55:05 legacy sshd[2841]: Failed password for invalid user kun from 201.72.238.179 port 29440 ssh2 ... |
2019-12-22 13:39:21 |
80.211.231.224 | attackbotsspam | Dec 22 07:55:18 hosting sshd[13149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.231.224 user=games Dec 22 07:55:20 hosting sshd[13149]: Failed password for games from 80.211.231.224 port 39872 ssh2 ... |
2019-12-22 13:21:19 |
74.63.226.142 | attackbots | Dec 21 18:49:47 web1 sshd\[29931\]: Invalid user crans from 74.63.226.142 Dec 21 18:49:47 web1 sshd\[29931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.226.142 Dec 21 18:49:49 web1 sshd\[29931\]: Failed password for invalid user crans from 74.63.226.142 port 57536 ssh2 Dec 21 18:55:30 web1 sshd\[30479\]: Invalid user pellan from 74.63.226.142 Dec 21 18:55:30 web1 sshd\[30479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.226.142 |
2019-12-22 13:10:49 |
49.88.112.63 | attackspam | Dec 21 19:14:53 sachi sshd\[23333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.63 user=root Dec 21 19:14:56 sachi sshd\[23333\]: Failed password for root from 49.88.112.63 port 19177 ssh2 Dec 21 19:14:58 sachi sshd\[23333\]: Failed password for root from 49.88.112.63 port 19177 ssh2 Dec 21 19:15:02 sachi sshd\[23333\]: Failed password for root from 49.88.112.63 port 19177 ssh2 Dec 21 19:15:12 sachi sshd\[23362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.63 user=root |
2019-12-22 13:21:39 |