City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.134.1.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3260
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.134.1.68. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062700 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 00:53:42 CST 2025
;; MSG SIZE rcvd: 105
Host 68.1.134.169.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 68.1.134.169.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.12.198.77 | attack | [AUTOMATIC REPORT] - 21 tries in total - SSH BRUTE FORCE - IP banned |
2020-02-18 08:10:03 |
| 77.159.249.91 | attack | Ssh brute force |
2020-02-18 08:31:21 |
| 41.224.241.19 | attackspam | Automatic report - SSH Brute-Force Attack |
2020-02-18 08:35:54 |
| 77.201.199.59 | attackbotsspam | 2020-02-03T16:05:50.704724suse-nuc sshd[10022]: Invalid user tcl from 77.201.199.59 port 58556 ... |
2020-02-18 08:27:34 |
| 222.186.180.8 | attackbots | Feb 18 01:23:30 amit sshd\[7599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8 user=root Feb 18 01:23:32 amit sshd\[7599\]: Failed password for root from 222.186.180.8 port 34220 ssh2 Feb 18 01:23:48 amit sshd\[7606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8 user=root ... |
2020-02-18 08:26:04 |
| 76.73.206.90 | attack | $f2bV_matches |
2020-02-18 08:41:05 |
| 77.147.91.221 | attackbots | 2020-02-09T05:59:06.477742suse-nuc sshd[10165]: Invalid user qbn from 77.147.91.221 port 51494 ... |
2020-02-18 08:33:31 |
| 37.119.185.155 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-18 08:32:19 |
| 77.109.173.12 | attackbotsspam | 2020-02-12T02:50:03.620232suse-nuc sshd[19683]: Invalid user nat from 77.109.173.12 port 38658 ... |
2020-02-18 08:39:43 |
| 222.186.180.17 | attackbots | Feb 18 01:19:49 nextcloud sshd\[24067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17 user=root Feb 18 01:19:51 nextcloud sshd\[24067\]: Failed password for root from 222.186.180.17 port 38340 ssh2 Feb 18 01:20:01 nextcloud sshd\[24067\]: Failed password for root from 222.186.180.17 port 38340 ssh2 |
2020-02-18 08:21:29 |
| 139.59.43.104 | attackbotsspam | Port probing on unauthorized port 5907 |
2020-02-18 08:34:32 |
| 76.186.81.229 | attackspam | Invalid user git from 76.186.81.229 port 53875 |
2020-02-18 08:44:43 |
| 103.111.110.154 | attackbots | Feb 18 00:11:42 server sshd[2218208]: Failed password for root from 103.111.110.154 port 54688 ssh2 Feb 18 00:32:13 server sshd[2291041]: User postgres from 103.111.110.154 not allowed because not listed in AllowUsers Feb 18 00:32:15 server sshd[2291041]: Failed password for invalid user postgres from 103.111.110.154 port 59064 ssh2 |
2020-02-18 08:34:58 |
| 68.183.85.75 | attackspambots | Feb 18 01:07:52 mout sshd[21481]: Invalid user jboss from 68.183.85.75 port 32810 |
2020-02-18 08:10:46 |
| 69.175.97.170 | attackspam | 2019-09-22T08:30:43.596901-07:00 suse-nuc sshd[11442]: Bad protocol version identification 'GET / HTTP/1.1' from 69.175.97.170 port 37183 ... |
2020-02-18 08:27:51 |