City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.94.238.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20268
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.94.238.117. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 15:25:51 CST 2025
;; MSG SIZE rcvd: 107
117.238.94.134.in-addr.arpa domain name pointer ptj3151.ptj.kfa-juelich.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
117.238.94.134.in-addr.arpa name = ptj3151.ptj.kfa-juelich.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
82.64.8.132 | attackspambots | Jul 24 21:35:54 icinga sshd[19852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.8.132 Jul 24 21:35:55 icinga sshd[19852]: Failed password for invalid user ken from 82.64.8.132 port 50628 ssh2 ... |
2019-07-25 06:51:06 |
77.42.107.254 | attack | Automatic report - Port Scan Attack |
2019-07-25 06:59:07 |
23.129.64.202 | attackbots | Jul 25 00:51:04 server sshd\[2703\]: Invalid user admin from 23.129.64.202 port 31485 Jul 25 00:51:04 server sshd\[2703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.202 Jul 25 00:51:06 server sshd\[2703\]: Failed password for invalid user admin from 23.129.64.202 port 31485 ssh2 Jul 25 00:51:09 server sshd\[2703\]: Failed password for invalid user admin from 23.129.64.202 port 31485 ssh2 Jul 25 00:51:12 server sshd\[2703\]: Failed password for invalid user admin from 23.129.64.202 port 31485 ssh2 |
2019-07-25 06:45:22 |
185.86.164.99 | attackspam | CMS brute force ... |
2019-07-25 06:51:52 |
210.176.100.37 | attack | Automatic report - Banned IP Access |
2019-07-25 07:23:57 |
5.62.51.45 | attackbots | (From a1.excellence@tutanota.com) Hi, I came across your website and thought you would be interested. We are the supplier of ready made AliExpress dropshipping business websites. The average markup on products is 300% or more. No stock, No headaches, all items are dropshipped direcly from the suppliers. There are no monthly fees - domain and hosting are also n/c. You keep all of the profits on each sale. We design ready made dropship sites that is all we do. To see our latest available dropshipping sites please visit us at https://dropshippingincome.com We look forward to seing you there. Best, Gary DSI |
2019-07-25 07:21:15 |
213.6.15.246 | attackspambots | 2019-07-24T16:36:19.829647abusebot-6.cloudsearch.cf sshd\[8770\]: Invalid user ubnt from 213.6.15.246 port 57991 |
2019-07-25 06:59:59 |
193.169.252.171 | attack | SMTP:25. Blocked login attempt. |
2019-07-25 07:09:43 |
183.103.35.206 | attackbotsspam | Jul 24 16:35:45 *** sshd[20822]: Invalid user admin from 183.103.35.206 |
2019-07-25 07:10:42 |
68.183.83.82 | attack | Jul 25 01:49:43 server2 sshd\[1439\]: Invalid user fake from 68.183.83.82 Jul 25 01:49:44 server2 sshd\[1443\]: Invalid user user from 68.183.83.82 Jul 25 01:49:46 server2 sshd\[1445\]: Invalid user ubnt from 68.183.83.82 Jul 25 01:49:47 server2 sshd\[1447\]: Invalid user admin from 68.183.83.82 Jul 25 01:49:48 server2 sshd\[1450\]: User root from 68.183.83.82 not allowed because not listed in AllowUsers Jul 25 01:49:50 server2 sshd\[1453\]: Invalid user admin from 68.183.83.82 |
2019-07-25 06:53:28 |
168.0.83.193 | attackspam | 2019-07-24 23:34:56,239 fail2ban.actions [16526]: NOTICE [portsentry] Ban 168.0.83.193 ... |
2019-07-25 07:26:00 |
58.219.137.122 | attackbots | Jul 24 22:30:28 db01 sshd[26827]: Bad protocol version identification '' from 58.219.137.122 Jul 24 22:30:29 db01 sshd[26828]: Invalid user openhabian from 58.219.137.122 Jul 24 22:30:29 db01 sshd[26828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.219.137.122 Jul 24 22:30:31 db01 sshd[26828]: Failed password for invalid user openhabian from 58.219.137.122 port 41175 ssh2 Jul 24 22:30:32 db01 sshd[26828]: Connection closed by 58.219.137.122 [preauth] Jul 24 22:30:33 db01 sshd[26832]: Invalid user NetLinx from 58.219.137.122 Jul 24 22:30:33 db01 sshd[26832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.219.137.122 Jul 24 22:30:35 db01 sshd[26832]: Failed password for invalid user NetLinx from 58.219.137.122 port 42001 ssh2 Jul 24 22:30:35 db01 sshd[26832]: Connection closed by 58.219.137.122 [preauth] Jul 24 22:30:36 db01 sshd[26834]: Invalid user nexthink from 58.219.137.122 J........ ------------------------------- |
2019-07-25 07:11:56 |
88.61.0.21 | attack | Caught in portsentry honeypot |
2019-07-25 06:58:01 |
188.32.9.154 | attack | SSH invalid-user multiple login attempts |
2019-07-25 06:49:34 |
198.108.67.104 | attackbots | " " |
2019-07-25 07:27:22 |