City: Iida
Region: Nagano
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.133.104.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13058
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.133.104.94. IN A
;; AUTHORITY SECTION:
. 511 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023012300 1800 900 604800 86400
;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 23 15:29:47 CST 2023
;; MSG SIZE rcvd: 106
94.104.133.14.in-addr.arpa domain name pointer 14-133-104-94.area5b.commufa.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
94.104.133.14.in-addr.arpa name = 14-133-104-94.area5b.commufa.jp.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
45.122.246.145 | attackspambots | Auto Fail2Ban report, multiple SSH login attempts. |
2020-07-15 09:31:53 |
79.120.54.174 | attackbots | $f2bV_matches |
2020-07-15 09:34:10 |
187.120.217.157 | attackbots | 1594750977 - 07/14/2020 20:22:57 Host: 187.120.217.157/187.120.217.157 Port: 445 TCP Blocked |
2020-07-15 09:49:13 |
51.75.66.92 | attack | SSH Brute-Forcing (server2) |
2020-07-15 10:07:11 |
45.235.204.129 | attack | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-07-15 09:53:49 |
183.15.177.191 | attack | Jul 14 07:24:44 xxx sshd[2458]: Invalid user yiyi from 183.15.177.191 port 46796 Jul 14 07:24:44 xxx sshd[2458]: Failed password for invalid user yiyi from 183.15.177.191 port 46796 ssh2 Jul 14 07:24:44 xxx sshd[2458]: Received disconnect from 183.15.177.191 port 46796:11: Bye Bye [preauth] Jul 14 07:24:44 xxx sshd[2458]: Disconnected from 183.15.177.191 port 46796 [preauth] Jul 14 07:32:33 xxx sshd[4478]: Received disconnect from 183.15.177.191 port 55432:11: Bye Bye [preauth] Jul 14 07:32:33 xxx sshd[4478]: Disconnected from 183.15.177.191 port 55432 [preauth] Jul 14 07:34:15 xxx sshd[4593]: Invalid user automation from 183.15.177.191 port 47856 Jul 14 07:34:15 xxx sshd[4593]: Failed password for invalid user automation from 183.15.177.191 port 47856 ssh2 Jul 14 07:34:15 xxx sshd[4593]: Received disconnect from 183.15.177.191 port 47856:11: Bye Bye [preauth] Jul 14 07:34:15 xxx sshd[4593]: Disconnected from 183.15.177.191 port 47856 [preauth] ........ ----------------------------------------------- https: |
2020-07-15 09:39:50 |
116.235.131.148 | attackbots | Jul 15 04:55:53 ift sshd\[12015\]: Invalid user mongodb from 116.235.131.148Jul 15 04:55:55 ift sshd\[12015\]: Failed password for invalid user mongodb from 116.235.131.148 port 51426 ssh2Jul 15 05:00:28 ift sshd\[12821\]: Invalid user rose from 116.235.131.148Jul 15 05:00:31 ift sshd\[12821\]: Failed password for invalid user rose from 116.235.131.148 port 44474 ssh2Jul 15 05:05:16 ift sshd\[13480\]: Invalid user shashank from 116.235.131.148 ... |
2020-07-15 10:10:51 |
61.151.130.20 | attackspam | Jul 14 19:35:07 logopedia-1vcpu-1gb-nyc1-01 sshd[82596]: Invalid user user from 61.151.130.20 port 62301 ... |
2020-07-15 09:55:40 |
222.186.190.14 | attackspam | Jul 15 03:54:31 abendstille sshd\[28771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.14 user=root Jul 15 03:54:33 abendstille sshd\[28771\]: Failed password for root from 222.186.190.14 port 23757 ssh2 Jul 15 03:54:40 abendstille sshd\[28812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.14 user=root Jul 15 03:54:41 abendstille sshd\[28812\]: Failed password for root from 222.186.190.14 port 16075 ssh2 Jul 15 03:54:44 abendstille sshd\[28812\]: Failed password for root from 222.186.190.14 port 16075 ssh2 ... |
2020-07-15 10:01:33 |
139.199.228.133 | attack | $f2bV_matches |
2020-07-15 09:41:41 |
110.137.101.35 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-07-15 09:45:56 |
49.247.214.61 | attackbotsspam | Jul 15 03:13:51 ns381471 sshd[20456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.214.61 Jul 15 03:13:54 ns381471 sshd[20456]: Failed password for invalid user info3 from 49.247.214.61 port 41172 ssh2 |
2020-07-15 09:35:46 |
128.201.98.232 | attack | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-07-15 09:40:48 |
221.144.39.96 | attackspam | blogonese.net 221.144.39.96 [14/Jul/2020:20:22:43 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4262 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36" blogonese.net 221.144.39.96 [14/Jul/2020:20:22:49 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4262 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36" |
2020-07-15 09:57:49 |
155.4.117.13 | attackspambots | Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (=" |
2020-07-15 09:58:43 |