City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.12.149.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5278
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.12.149.134.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 19:20:04 CST 2025
;; MSG SIZE  rcvd: 107
        Host 134.149.12.142.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 134.149.12.142.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 2001:b011:4003:4681:a0fd:2c77:92f0:8566 | attackspambots | 2020-08-05T12:49:34.484272hermes postfix/smtpd[360639]: NOQUEUE: reject: RCPT from 2001-b011-4003-4681-a0fd-2c77-92f0-8566.dynamic-ip6.hinet.net[2001:b011:4003:4681:a0fd:2c77:92f0:8566]: 554 5.7.1 Service unavailable; Client host [2001:b011:4003:4681:a0fd:2c77:92f0:8566] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from=  | 
                    2020-08-05 18:15:38 | 
| 180.126.32.166 | attackspambots | 20 attempts against mh-ssh on flow  | 
                    2020-08-05 18:02:23 | 
| 45.129.33.7 | attack | 
  | 
                    2020-08-05 17:42:53 | 
| 45.141.84.219 | attackspam | Aug 5 11:27:52 debian-2gb-nbg1-2 kernel: \[18878134.286696\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.141.84.219 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=2616 PROTO=TCP SPT=52686 DPT=3721 WINDOW=1024 RES=0x00 SYN URGP=0  | 
                    2020-08-05 17:51:19 | 
| 27.65.179.202 | attackspambots | firewall-block, port(s): 81/tcp  | 
                    2020-08-05 17:51:49 | 
| 45.40.166.170 | attack | Automatic report - XMLRPC Attack  | 
                    2020-08-05 17:54:39 | 
| 193.112.54.190 | attackspambots | 2020-08-05T11:18:00.322543ks3355764 sshd[13175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.54.190 user=root 2020-08-05T11:18:02.217099ks3355764 sshd[13175]: Failed password for root from 193.112.54.190 port 33498 ssh2 ...  | 
                    2020-08-05 17:50:43 | 
| 202.59.166.146 | attackbotsspam | 2020-08-05T04:49:08.7626591495-001 sshd[13964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.59.166.146 user=root 2020-08-05T04:49:11.2187631495-001 sshd[13964]: Failed password for root from 202.59.166.146 port 39371 ssh2 2020-08-05T04:52:24.4473761495-001 sshd[14186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.59.166.146 user=root 2020-08-05T04:52:26.4773601495-001 sshd[14186]: Failed password for root from 202.59.166.146 port 50922 ssh2 2020-08-05T04:55:32.2036651495-001 sshd[14351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.59.166.146 user=root 2020-08-05T04:55:34.7101681495-001 sshd[14351]: Failed password for root from 202.59.166.146 port 34231 ssh2 ...  | 
                    2020-08-05 18:03:44 | 
| 202.100.188.108 | attack | Aug 5 00:03:42 NPSTNNYC01T sshd[20383]: Failed password for root from 202.100.188.108 port 4117 ssh2 Aug 5 00:08:30 NPSTNNYC01T sshd[20895]: Failed password for root from 202.100.188.108 port 55651 ssh2 ...  | 
                    2020-08-05 18:11:55 | 
| 111.229.167.10 | attackspam | SSH invalid-user multiple login attempts  | 
                    2020-08-05 17:45:58 | 
| 107.23.220.51 | attack | 107.23.220.51 - - \[05/Aug/2020:11:48:23 +0200\] "POST /wp-login.php HTTP/1.0" 200 6728 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 107.23.220.51 - - \[05/Aug/2020:11:48:25 +0200\] "POST /wp-login.php HTTP/1.0" 200 6558 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 107.23.220.51 - - \[05/Aug/2020:11:48:27 +0200\] "POST /wp-login.php HTTP/1.0" 200 6552 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"  | 
                    2020-08-05 18:01:31 | 
| 106.75.234.54 | attackbots | Aug 5 09:22:28 ip106 sshd[8254]: Failed password for root from 106.75.234.54 port 56204 ssh2 ...  | 
                    2020-08-05 17:48:59 | 
| 37.187.132.132 | attackspam | enlinea.de 37.187.132.132 [01/Aug/2020:16:34:13 +0200] "POST /wp-login.php HTTP/1.1" 200 6105 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" enlinea.de 37.187.132.132 [01/Aug/2020:16:34:14 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4110 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"  | 
                    2020-08-05 18:08:44 | 
| 124.29.235.6 | attack | Unauthorized connection attempt from IP address 124.29.235.6 on Port 445(SMB)  | 
                    2020-08-05 18:13:57 | 
| 218.241.206.66 | attackbots | Aug 4 18:57:41 hanapaa sshd\[5437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.206.66 user=root Aug 4 18:57:42 hanapaa sshd\[5437\]: Failed password for root from 218.241.206.66 port 2069 ssh2 Aug 4 19:02:42 hanapaa sshd\[5731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.206.66 user=root Aug 4 19:02:44 hanapaa sshd\[5731\]: Failed password for root from 218.241.206.66 port 2070 ssh2 Aug 4 19:07:38 hanapaa sshd\[6089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.241.206.66 user=root  | 
                    2020-08-05 18:00:32 |