City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.134.20.171
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44248
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;143.134.20.171. IN A
;; AUTHORITY SECTION:
. 422 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022052500 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 25 17:42:13 CST 2022
;; MSG SIZE rcvd: 107
b'Host 171.20.134.143.in-addr.arpa. not found: 3(NXDOMAIN)
'
server can't find 143.134.20.171.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
121.134.159.21 | attackspam | Unauthorized connection attempt detected from IP address 121.134.159.21 to port 2220 [J] |
2020-02-03 06:43:28 |
193.112.104.240 | attackspam | Mar 4 14:20:22 ms-srv sshd[52420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.104.240 user=root Mar 4 14:20:23 ms-srv sshd[52420]: Failed password for invalid user root from 193.112.104.240 port 51826 ssh2 |
2020-02-03 06:31:34 |
83.121.223.90 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 02-02-2020 15:05:31. |
2020-02-03 07:03:33 |
197.255.220.156 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-03 06:50:22 |
106.12.98.7 | attack | Unauthorized connection attempt detected from IP address 106.12.98.7 to port 2220 [J] |
2020-02-03 06:32:21 |
104.206.128.38 | attackspam | Unauthorized connection attempt detected from IP address 104.206.128.38 to port 3306 [J] |
2020-02-03 06:29:52 |
68.114.85.179 | attack | Unauthorized connection attempt detected from IP address 68.114.85.179 to port 9000 [J] |
2020-02-03 06:43:55 |
192.99.2.97 | attack | Apr 18 07:29:20 ms-srv sshd[61752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.2.97 user=root Apr 18 07:29:22 ms-srv sshd[61752]: Failed password for invalid user root from 192.99.2.97 port 9224 ssh2 |
2020-02-03 06:53:47 |
193.112.1.52 | attackbotsspam | Jan 31 01:36:04 ms-srv sshd[58555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.1.52 Jan 31 01:36:06 ms-srv sshd[58555]: Failed password for invalid user user1 from 193.112.1.52 port 37664 ssh2 |
2020-02-03 06:33:35 |
1.175.164.80 | attackspam | Honeypot attack, port: 5555, PTR: 1-175-164-80.dynamic-ip.hinet.net. |
2020-02-03 06:40:23 |
139.213.8.195 | attackspam | Port scan detected on ports: 40382[UDP], 40382[UDP], 40382[TCP] |
2020-02-03 06:55:00 |
192.99.247.232 | attackbotsspam | Sep 10 01:21:22 ms-srv sshd[61076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.247.232 Sep 10 01:21:24 ms-srv sshd[61076]: Failed password for invalid user vncuser from 192.99.247.232 port 35010 ssh2 |
2020-02-03 06:45:13 |
141.98.80.141 | attackbots | (PA/Panama/-) SMTP Bruteforcing attempts |
2020-02-03 06:53:01 |
185.220.101.35 | attackspam | Automatic report - Banned IP Access |
2020-02-03 06:40:02 |
69.229.6.54 | attackbotsspam | Unauthorized connection attempt detected from IP address 69.229.6.54 to port 2220 [J] |
2020-02-03 06:36:40 |