City: Bakersfield
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: Charter Communications, Inc
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 174.134.113.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59668
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;174.134.113.1. IN A
;; AUTHORITY SECTION:
. 3436 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019072201 1800 900 604800 86400
;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 23 02:37:31 CST 2019
;; MSG SIZE rcvd: 117
1.113.134.174.in-addr.arpa domain name pointer 174-134-113-1.res.bhn.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
1.113.134.174.in-addr.arpa name = 174-134-113-1.res.bhn.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
122.226.134.39 | attack | May 15 12:18:34 game-panel sshd[17261]: Failed password for root from 122.226.134.39 port 20296 ssh2 May 15 12:21:24 game-panel sshd[17413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.226.134.39 May 15 12:21:26 game-panel sshd[17413]: Failed password for invalid user gok from 122.226.134.39 port 28476 ssh2 |
2020-05-16 02:40:57 |
49.233.171.219 | attack | 5x Failed Password |
2020-05-16 02:49:00 |
36.73.110.98 | attackspambots | May 15 05:14:58 spidey sshd[10492]: Invalid user tech from 36.73.110.98 port 62886 May 15 05:14:58 spidey sshd[10494]: Invalid user tech from 36.73.110.98 port 62889 May 15 05:14:59 spidey sshd[10497]: Invalid user tech from 36.73.110.98 port 63128 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=36.73.110.98 |
2020-05-16 02:46:07 |
103.253.3.214 | attack | 2020-05-14 13:40:51 server sshd[32192]: Failed password for invalid user jboss from 103.253.3.214 port 52222 ssh2 |
2020-05-16 02:26:05 |
107.170.20.247 | attackbots | 2020-05-15T15:21:22.719462abusebot-4.cloudsearch.cf sshd[27640]: Invalid user git from 107.170.20.247 port 45619 2020-05-15T15:21:22.726309abusebot-4.cloudsearch.cf sshd[27640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.20.247 2020-05-15T15:21:22.719462abusebot-4.cloudsearch.cf sshd[27640]: Invalid user git from 107.170.20.247 port 45619 2020-05-15T15:21:25.009498abusebot-4.cloudsearch.cf sshd[27640]: Failed password for invalid user git from 107.170.20.247 port 45619 ssh2 2020-05-15T15:24:44.571816abusebot-4.cloudsearch.cf sshd[27860]: Invalid user pfs from 107.170.20.247 port 38403 2020-05-15T15:24:44.578293abusebot-4.cloudsearch.cf sshd[27860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.20.247 2020-05-15T15:24:44.571816abusebot-4.cloudsearch.cf sshd[27860]: Invalid user pfs from 107.170.20.247 port 38403 2020-05-15T15:24:46.926603abusebot-4.cloudsearch.cf sshd[27860]: Failed pa ... |
2020-05-16 02:27:44 |
111.229.122.177 | attackbotsspam | fail2ban/May 15 18:28:52 h1962932 sshd[9529]: Invalid user andres from 111.229.122.177 port 44090 May 15 18:28:52 h1962932 sshd[9529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.122.177 May 15 18:28:52 h1962932 sshd[9529]: Invalid user andres from 111.229.122.177 port 44090 May 15 18:28:55 h1962932 sshd[9529]: Failed password for invalid user andres from 111.229.122.177 port 44090 ssh2 May 15 18:32:43 h1962932 sshd[9635]: Invalid user ubuntu from 111.229.122.177 port 52666 |
2020-05-16 02:59:11 |
45.234.28.21 | attackbots | Automatic report - Port Scan Attack |
2020-05-16 02:54:38 |
209.17.96.194 | attack | The IP has triggered Cloudflare WAF. CF-Ray: 593b2c76ee02eaae | WAF_Rule_ID: 4c344d8609cf47c88674e7c5f743a22c | WAF_Kind: firewall | CF_Action: drop | Country: US | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: dl.wevg.org | User-Agent: Mozilla/5.0 (compatible; Nimbostratus-Bot/v1.3.2; http://cloudsystemnetworks.com) | CF_DC: IAD. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2020-05-16 02:29:08 |
170.106.38.178 | attack | trying to access non-authorized port |
2020-05-16 02:57:10 |
186.234.249.196 | attackbotsspam | May 15 19:50:35 ns392434 sshd[15003]: Invalid user oo from 186.234.249.196 port 22489 May 15 19:50:35 ns392434 sshd[15003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.234.249.196 May 15 19:50:35 ns392434 sshd[15003]: Invalid user oo from 186.234.249.196 port 22489 May 15 19:50:36 ns392434 sshd[15003]: Failed password for invalid user oo from 186.234.249.196 port 22489 ssh2 May 15 19:59:45 ns392434 sshd[15200]: Invalid user administrator from 186.234.249.196 port 28237 May 15 19:59:45 ns392434 sshd[15200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.234.249.196 May 15 19:59:45 ns392434 sshd[15200]: Invalid user administrator from 186.234.249.196 port 28237 May 15 19:59:47 ns392434 sshd[15200]: Failed password for invalid user administrator from 186.234.249.196 port 28237 ssh2 May 15 20:02:51 ns392434 sshd[15226]: Invalid user support from 186.234.249.196 port 50128 |
2020-05-16 02:33:02 |
117.87.219.212 | attackbots | SpamScore above: 10.0 |
2020-05-16 02:42:40 |
159.138.65.33 | attackbots | May 15 18:24:32 nextcloud sshd\[24394\]: Invalid user xnc from 159.138.65.33 May 15 18:24:32 nextcloud sshd\[24394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.138.65.33 May 15 18:24:34 nextcloud sshd\[24394\]: Failed password for invalid user xnc from 159.138.65.33 port 53624 ssh2 |
2020-05-16 02:34:56 |
203.106.41.154 | attack | 2020-05-15T20:18:22.332651vps773228.ovh.net sshd[31378]: Invalid user leslie from 203.106.41.154 port 49026 2020-05-15T20:18:22.341629vps773228.ovh.net sshd[31378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.106.41.154 2020-05-15T20:18:22.332651vps773228.ovh.net sshd[31378]: Invalid user leslie from 203.106.41.154 port 49026 2020-05-15T20:18:24.568049vps773228.ovh.net sshd[31378]: Failed password for invalid user leslie from 203.106.41.154 port 49026 ssh2 2020-05-15T20:21:53.164206vps773228.ovh.net sshd[31430]: Invalid user linux from 203.106.41.154 port 42992 ... |
2020-05-16 02:38:32 |
88.88.40.133 | attackbots | SSH Brute-Force attacks |
2020-05-16 02:58:24 |
78.37.17.226 | attackbotsspam | Lines containing failures of 78.37.17.226 May 15 14:14:37 shared07 sshd[4205]: Did not receive identification string from 78.37.17.226 port 17253 May 15 14:14:41 shared07 sshd[4216]: Invalid user Adminixxxr from 78.37.17.226 port 11031 May 15 14:14:41 shared07 sshd[4216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.37.17.226 May 15 14:14:43 shared07 sshd[4216]: Failed password for invalid user Adminixxxr from 78.37.17.226 port 11031 ssh2 May 15 14:14:43 shared07 sshd[4216]: Connection closed by invalid user Adminixxxr 78.37.17.226 port 11031 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=78.37.17.226 |
2020-05-16 02:39:05 |