City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.98.207.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.98.207.45. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 04:05:25 CST 2025
;; MSG SIZE rcvd: 106
Host 45.207.98.134.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 45.207.98.134.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.196.71.132 | attack | SSH login attempts with user root. |
2020-03-19 04:50:30 |
| 113.108.88.78 | attack | Mar 18 20:27:41 dev0-dcde-rnet sshd[15058]: Failed password for root from 113.108.88.78 port 35016 ssh2 Mar 18 20:35:51 dev0-dcde-rnet sshd[15096]: Failed password for root from 113.108.88.78 port 51086 ssh2 |
2020-03-19 05:00:12 |
| 150.109.110.98 | attackbots | Mar 18 21:30:55 vmd26974 sshd[3276]: Failed password for root from 150.109.110.98 port 58470 ssh2 ... |
2020-03-19 04:43:33 |
| 52.183.128.237 | attackbots | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-03-19 05:13:49 |
| 122.180.48.29 | attackspambots | Mar 18 18:18:41 jane sshd[28158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.180.48.29 Mar 18 18:18:43 jane sshd[28158]: Failed password for invalid user redmine from 122.180.48.29 port 46306 ssh2 ... |
2020-03-19 04:45:33 |
| 104.16.209.86 | spam | AGAIN and AGAIN and ALWAYS the same REGISTRAR as 1api.net TO STOP IMMEDIATELY for keeping SPAMMERS, LIERS, ROBERS and else since too many years ! The cheapest service, as usual... Dossier transmis aux autorités Européennes et Françaises pour CONDAMNATION à 750 € par POURRIEL émis les SOUS MERDES, OK ? From: Joka |
2020-03-19 05:04:59 |
| 78.128.113.93 | attack | 2020-03-18 22:09:46 dovecot_login authenticator failed for \(ip-113-93.4vendeta.com.\) \[78.128.113.93\]: 535 Incorrect authentication data \(set_id=sales@opso.it\) 2020-03-18 22:09:55 dovecot_login authenticator failed for \(ip-113-93.4vendeta.com.\) \[78.128.113.93\]: 535 Incorrect authentication data 2020-03-18 22:10:05 dovecot_login authenticator failed for \(ip-113-93.4vendeta.com.\) \[78.128.113.93\]: 535 Incorrect authentication data 2020-03-18 22:10:11 dovecot_login authenticator failed for \(ip-113-93.4vendeta.com.\) \[78.128.113.93\]: 535 Incorrect authentication data 2020-03-18 22:10:24 dovecot_login authenticator failed for \(ip-113-93.4vendeta.com.\) \[78.128.113.93\]: 535 Incorrect authentication data |
2020-03-19 05:12:35 |
| 222.236.198.50 | attackbots | (sshd) Failed SSH login from 222.236.198.50 (KR/South Korea/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 18 19:00:00 ubnt-55d23 sshd[13891]: Invalid user postgres from 222.236.198.50 port 55294 Mar 18 19:00:02 ubnt-55d23 sshd[13891]: Failed password for invalid user postgres from 222.236.198.50 port 55294 ssh2 |
2020-03-19 05:04:40 |
| 104.131.55.236 | attackbotsspam | Fail2Ban Ban Triggered |
2020-03-19 04:41:32 |
| 178.171.58.193 | attackbotsspam | Chat Spam |
2020-03-19 04:54:37 |
| 187.4.84.131 | attack | Automatic report - Port Scan Attack |
2020-03-19 04:42:51 |
| 198.108.66.31 | attackbotsspam | Portscan or hack attempt detected by psad/fwsnort |
2020-03-19 04:46:43 |
| 119.193.27.90 | attackbots | Mar 18 20:38:38 game-panel sshd[5502]: Failed password for root from 119.193.27.90 port 39729 ssh2 Mar 18 20:41:57 game-panel sshd[5685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.193.27.90 Mar 18 20:42:00 game-panel sshd[5685]: Failed password for invalid user guest from 119.193.27.90 port 39638 ssh2 |
2020-03-19 04:54:16 |
| 93.90.74.182 | attackspam | k+ssh-bruteforce |
2020-03-19 05:16:42 |
| 1.202.115.29 | attackspambots | Mar 17 18:16:01 cumulus sshd[13586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.202.115.29 user=r.r Mar 17 18:16:03 cumulus sshd[13586]: Failed password for r.r from 1.202.115.29 port 48385 ssh2 Mar 17 18:16:03 cumulus sshd[13586]: Received disconnect from 1.202.115.29 port 48385:11: Bye Bye [preauth] Mar 17 18:16:03 cumulus sshd[13586]: Disconnected from 1.202.115.29 port 48385 [preauth] Mar 17 18:23:34 cumulus sshd[14117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.202.115.29 user=r.r Mar 17 18:23:37 cumulus sshd[14117]: Failed password for r.r from 1.202.115.29 port 64097 ssh2 Mar 17 18:23:37 cumulus sshd[14117]: Received disconnect from 1.202.115.29 port 64097:11: Bye Bye [preauth] Mar 17 18:23:37 cumulus sshd[14117]: Disconnected from 1.202.115.29 port 64097 [preauth] Mar 17 18:25:53 cumulus sshd[14211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 ........ ------------------------------- |
2020-03-19 04:43:55 |