City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.87.213.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29931
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.87.213.42.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:36:46 CST 2025
;; MSG SIZE  rcvd: 106Host 42.213.87.134.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 42.213.87.134.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 158.51.124.112 | attackspam | 158.51.124.112 - - [04/Oct/2020:12:25:25 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 158.51.124.112 - - [04/Oct/2020:12:25:26 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 158.51.124.112 - - [04/Oct/2020:12:25:28 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" | 2020-10-04 18:47:47 | 
| 164.90.185.34 | attack | [H1.VM2] Blocked by UFW | 2020-10-04 18:56:48 | 
| 129.226.112.181 | attack | 
 | 2020-10-04 18:55:20 | 
| 41.225.39.231 | attackbotsspam | Automatic report - Port Scan Attack | 2020-10-04 18:46:06 | 
| 122.155.174.36 | attack | Oct 4 12:12:21 OPSO sshd\[15389\]: Invalid user tibero from 122.155.174.36 port 59938 Oct 4 12:12:21 OPSO sshd\[15389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.174.36 Oct 4 12:12:23 OPSO sshd\[15389\]: Failed password for invalid user tibero from 122.155.174.36 port 59938 ssh2 Oct 4 12:15:44 OPSO sshd\[16202\]: Invalid user teaspeak from 122.155.174.36 port 42298 Oct 4 12:15:44 OPSO sshd\[16202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.174.36 | 2020-10-04 19:00:52 | 
| 183.148.151.5 | attackspambots | Brute forcing email accounts | 2020-10-04 19:00:28 | 
| 103.18.6.65 | attackbots | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: | 2020-10-04 18:20:10 | 
| 119.28.84.19 | attack | leo_www | 2020-10-04 18:29:42 | 
| 190.167.5.118 | attackbotsspam | (sshd) Failed SSH login from 190.167.5.118 (DO/Dominican Republic/118.5.167.190.d.dyn.codetel.net.do): 10 in the last 3600 secs | 2020-10-04 18:29:11 | 
| 222.66.154.98 | attackspambots | 2020-10-04T12:27:34.400017ollin.zadara.org sshd[166854]: Invalid user uno8 from 222.66.154.98 port 56430 2020-10-04T12:27:36.367511ollin.zadara.org sshd[166854]: Failed password for invalid user uno8 from 222.66.154.98 port 56430 ssh2 ... | 2020-10-04 18:34:35 | 
| 103.127.207.30 | attackspam | 1601757372 - 10/03/2020 22:36:12 Host: 103.127.207.30/103.127.207.30 Port: 445 TCP Blocked ... | 2020-10-04 18:49:21 | 
| 45.227.255.204 | attack | Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-10-04T10:18:24Z | 2020-10-04 18:30:33 | 
| 155.4.70.11 | attackspam | SSH_attack | 2020-10-04 18:52:08 | 
| 66.240.192.138 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 60 - port: 1723 proto: tcp cat: Misc Attackbytes: 60 | 2020-10-04 18:38:04 | 
| 118.24.50.107 | attackbots | Invalid user tomcat from 118.24.50.107 port 51156 | 2020-10-04 18:27:27 |