City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.89.68.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17533
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.89.68.243. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 17:42:46 CST 2025
;; MSG SIZE rcvd: 106
Host 243.68.89.134.in-addr.arpa not found: 2(SERVFAIL)
server can't find 134.89.68.243.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 69.229.6.32 | attackbotsspam | Sep 28 11:32:21 mail sshd[21309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.229.6.32 Sep 28 11:32:23 mail sshd[21309]: Failed password for invalid user sg from 69.229.6.32 port 57778 ssh2 ... |
2020-09-28 18:46:56 |
| 122.224.237.234 | attackbotsspam | 2020-09-28T09:31:38.518646shield sshd\[14344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.237.234 user=root 2020-09-28T09:31:40.332845shield sshd\[14344\]: Failed password for root from 122.224.237.234 port 43537 ssh2 2020-09-28T09:33:58.159004shield sshd\[14665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.237.234 user=root 2020-09-28T09:34:00.525389shield sshd\[14665\]: Failed password for root from 122.224.237.234 port 58087 ssh2 2020-09-28T09:36:15.204914shield sshd\[14873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.237.234 user=root |
2020-09-28 19:10:24 |
| 120.53.246.226 | attack | Sep 28 12:37:10 srv-ubuntu-dev3 sshd[73397]: Invalid user ts3user from 120.53.246.226 Sep 28 12:37:10 srv-ubuntu-dev3 sshd[73397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.246.226 Sep 28 12:37:10 srv-ubuntu-dev3 sshd[73397]: Invalid user ts3user from 120.53.246.226 Sep 28 12:37:12 srv-ubuntu-dev3 sshd[73397]: Failed password for invalid user ts3user from 120.53.246.226 port 59456 ssh2 Sep 28 12:40:55 srv-ubuntu-dev3 sshd[73837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.246.226 user=root Sep 28 12:40:57 srv-ubuntu-dev3 sshd[73837]: Failed password for root from 120.53.246.226 port 43156 ssh2 Sep 28 12:44:46 srv-ubuntu-dev3 sshd[74288]: Invalid user apps from 120.53.246.226 Sep 28 12:44:46 srv-ubuntu-dev3 sshd[74288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.246.226 Sep 28 12:44:46 srv-ubuntu-dev3 sshd[74288]: Invalid user apps ... |
2020-09-28 18:51:30 |
| 103.123.8.75 | attackspam | Invalid user kafka from 103.123.8.75 port 58966 |
2020-09-28 19:13:33 |
| 183.109.124.137 | attackspam | 2020-09-28T12:56:34.591651paragon sshd[474653]: Invalid user mukesh from 183.109.124.137 port 23368 2020-09-28T12:56:34.595802paragon sshd[474653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.109.124.137 2020-09-28T12:56:34.591651paragon sshd[474653]: Invalid user mukesh from 183.109.124.137 port 23368 2020-09-28T12:56:36.235677paragon sshd[474653]: Failed password for invalid user mukesh from 183.109.124.137 port 23368 ssh2 2020-09-28T12:58:11.356031paragon sshd[474667]: Invalid user Redistoor from 183.109.124.137 port 36268 ... |
2020-09-28 19:08:09 |
| 91.144.162.118 | attackbotsspam | Triggered by Fail2Ban at Ares web server |
2020-09-28 18:49:00 |
| 103.195.101.116 | attackspam |
|
2020-09-28 18:56:22 |
| 106.12.96.91 | attackspam | Sep 28 08:29:41 lavrea sshd[35056]: Invalid user teamspeak from 106.12.96.91 port 53730 ... |
2020-09-28 19:02:58 |
| 49.234.126.35 | attackspambots | 2020-09-28T07:47:37.419149vps-d63064a2 sshd[13283]: User root from 49.234.126.35 not allowed because not listed in AllowUsers 2020-09-28T07:47:40.133084vps-d63064a2 sshd[13283]: Failed password for invalid user root from 49.234.126.35 port 60998 ssh2 2020-09-28T07:53:05.818060vps-d63064a2 sshd[13371]: Invalid user webserver from 49.234.126.35 port 33790 2020-09-28T07:53:05.825901vps-d63064a2 sshd[13371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.126.35 2020-09-28T07:53:05.818060vps-d63064a2 sshd[13371]: Invalid user webserver from 49.234.126.35 port 33790 2020-09-28T07:53:07.887291vps-d63064a2 sshd[13371]: Failed password for invalid user webserver from 49.234.126.35 port 33790 ssh2 ... |
2020-09-28 19:16:15 |
| 132.232.230.220 | attackspambots | Sep 28 02:34:59 *hidden* sshd[19068]: Invalid user teamspeak from 132.232.230.220 port 41075 Sep 28 02:34:59 *hidden* sshd[19068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.230.220 Sep 28 02:35:01 *hidden* sshd[19068]: Failed password for invalid user teamspeak from 132.232.230.220 port 41075 ssh2 |
2020-09-28 19:05:36 |
| 201.203.117.33 | attackbotsspam | Sep 28 10:23:19 sso sshd[30579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.203.117.33 Sep 28 10:23:21 sso sshd[30579]: Failed password for invalid user deploy from 201.203.117.33 port 50716 ssh2 ... |
2020-09-28 18:57:38 |
| 124.93.222.211 | attack | DATE:2020-09-28 09:51:17, IP:124.93.222.211, PORT:ssh SSH brute force auth (docker-dc) |
2020-09-28 19:12:06 |
| 116.55.248.214 | attack | $f2bV_matches |
2020-09-28 19:17:18 |
| 51.254.129.170 | attack | Sep 28 17:13:34 itv-usvr-02 sshd[17986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.129.170 user=root Sep 28 17:13:35 itv-usvr-02 sshd[17986]: Failed password for root from 51.254.129.170 port 57456 ssh2 Sep 28 17:22:31 itv-usvr-02 sshd[18246]: Invalid user myftp from 51.254.129.170 port 42860 Sep 28 17:22:31 itv-usvr-02 sshd[18246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.129.170 Sep 28 17:22:31 itv-usvr-02 sshd[18246]: Invalid user myftp from 51.254.129.170 port 42860 Sep 28 17:22:34 itv-usvr-02 sshd[18246]: Failed password for invalid user myftp from 51.254.129.170 port 42860 ssh2 |
2020-09-28 19:18:10 |
| 45.142.120.74 | attackbots | $f2bV_matches |
2020-09-28 18:55:29 |