City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.142.72.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50143
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;163.142.72.134. IN A
;; AUTHORITY SECTION:
. 586 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:58:00 CST 2022
;; MSG SIZE rcvd: 107
Host 134.72.142.163.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 134.72.142.163.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
164.163.2.4 | attack | SSH Brute-Force attacks |
2019-08-11 03:04:15 |
178.128.246.54 | attackspam | frenzy |
2019-08-11 03:16:15 |
114.106.150.103 | attackbotsspam | 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x 2019-08-10 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=114.106.150.103 |
2019-08-11 03:22:36 |
54.37.46.137 | attackspambots | $f2bV_matches |
2019-08-11 02:59:48 |
186.208.221.98 | attackbotsspam | SMB Server BruteForce Attack |
2019-08-11 03:03:11 |
36.111.35.10 | attackbotsspam | Aug 10 18:18:31 v22018076622670303 sshd\[10641\]: Invalid user ubuntu from 36.111.35.10 port 33294 Aug 10 18:18:31 v22018076622670303 sshd\[10641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.35.10 Aug 10 18:18:32 v22018076622670303 sshd\[10641\]: Failed password for invalid user ubuntu from 36.111.35.10 port 33294 ssh2 ... |
2019-08-11 02:53:04 |
200.39.236.99 | attack | Automatic report - Port Scan Attack |
2019-08-11 03:17:56 |
172.93.100.126 | attackspam | Brute force RDP, port 3389 |
2019-08-11 03:11:45 |
79.153.184.235 | attackspambots | ES Spain 235.red-79-153-184.dynamicip.rima-tde.net Hits: 11 |
2019-08-11 03:25:59 |
34.68.217.101 | attack | "Inject un'a=0" |
2019-08-11 02:57:43 |
51.79.129.235 | attackspam | Aug 10 14:05:37 ovpn sshd\[13743\]: Invalid user user3 from 51.79.129.235 Aug 10 14:05:37 ovpn sshd\[13743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.129.235 Aug 10 14:05:40 ovpn sshd\[13743\]: Failed password for invalid user user3 from 51.79.129.235 port 39450 ssh2 Aug 10 14:14:27 ovpn sshd\[15409\]: Invalid user venda from 51.79.129.235 Aug 10 14:14:27 ovpn sshd\[15409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.129.235 |
2019-08-11 02:40:18 |
193.107.221.176 | attackbots | proto=tcp . spt=48196 . dpt=25 . (listed on Github Combined on 3 lists ) (518) |
2019-08-11 02:41:39 |
192.99.70.12 | attack | Feb 24 16:31:45 motanud sshd\[25472\]: Invalid user sanjeev from 192.99.70.12 port 53252 Feb 24 16:31:45 motanud sshd\[25472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.70.12 Feb 24 16:31:48 motanud sshd\[25472\]: Failed password for invalid user sanjeev from 192.99.70.12 port 53252 ssh2 |
2019-08-11 03:22:15 |
213.14.116.235 | attackbotsspam | ENG,WP GET /wp-login.php |
2019-08-11 03:11:09 |
185.244.25.124 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-08-11 02:40:48 |