City: Lamont
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 174.134.88.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16998
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;174.134.88.161. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 10:32:06 CST 2025
;; MSG SIZE rcvd: 107
161.88.134.174.in-addr.arpa domain name pointer syn-174-134-088-161.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
161.88.134.174.in-addr.arpa name = syn-174-134-088-161.res.spectrum.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 62.234.124.104 | attackspambots | Unauthorized connection attempt detected from IP address 62.234.124.104 to port 2220 [J] |
2020-01-07 22:21:52 |
| 45.141.86.128 | attackbotsspam | detected by Fail2Ban |
2020-01-07 22:19:49 |
| 103.54.219.106 | attack | Unauthorized connection attempt from IP address 103.54.219.106 on Port 445(SMB) |
2020-01-07 22:12:35 |
| 49.235.216.174 | attackspambots | Jan 7 12:58:59 124388 sshd[2618]: Failed password for root from 49.235.216.174 port 60352 ssh2 Jan 7 13:03:08 124388 sshd[2650]: Invalid user jira from 49.235.216.174 port 59318 Jan 7 13:03:08 124388 sshd[2650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.216.174 Jan 7 13:03:08 124388 sshd[2650]: Invalid user jira from 49.235.216.174 port 59318 Jan 7 13:03:11 124388 sshd[2650]: Failed password for invalid user jira from 49.235.216.174 port 59318 ssh2 |
2020-01-07 22:08:35 |
| 190.144.104.50 | attack | 20/1/7@08:03:07: FAIL: Alarm-Network address from=190.144.104.50 ... |
2020-01-07 22:11:03 |
| 123.207.171.211 | attackbotsspam | Jan 7 07:28:04 onepro3 sshd[20213]: Failed password for invalid user music from 123.207.171.211 port 41354 ssh2 Jan 7 07:58:53 onepro3 sshd[20537]: Failed password for invalid user admin from 123.207.171.211 port 59846 ssh2 Jan 7 08:02:43 onepro3 sshd[20543]: Failed password for invalid user kelvin from 123.207.171.211 port 59502 ssh2 |
2020-01-07 22:37:59 |
| 162.241.192.138 | attack | Triggered by Fail2Ban at Vostok web server |
2020-01-07 21:55:49 |
| 92.63.194.81 | attackspambots | Jan 7 14:02:49 mail kernel: [3421909.997186] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=92.63.194.81 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=53829 DF PROTO=TCP SPT=43299 DPT=1723 WINDOW=29200 RES=0x00 SYN URGP=0 Jan 7 14:02:50 mail kernel: [3421911.028839] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=92.63.194.81 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=53830 DF PROTO=TCP SPT=43299 DPT=1723 WINDOW=29200 RES=0x00 SYN URGP=0 Jan 7 14:02:52 mail kernel: [3421913.045374] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=92.63.194.81 DST=91.205.173.180 LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=53831 DF PROTO=TCP SPT=43299 DPT=1723 WINDOW=29200 RES=0x00 SYN URGP=0 |
2020-01-07 22:29:38 |
| 120.132.124.237 | attackbots | Jan 7 07:57:41 debian sshd[16008]: Unable to negotiate with 120.132.124.237 port 46556: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] Jan 7 08:03:29 debian sshd[16241]: Unable to negotiate with 120.132.124.237 port 41056: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1 [preauth] ... |
2020-01-07 21:53:53 |
| 140.143.206.216 | attackspam | Unauthorized SSH login attempts |
2020-01-07 22:19:03 |
| 167.86.127.153 | attackspam | *Port Scan* detected from 167.86.127.153 (DE/Germany/vmi274482.contaboserver.net). 11 hits in the last 170 seconds |
2020-01-07 22:01:50 |
| 175.24.138.108 | attack | Jan 7 14:37:41 srv01 sshd[31495]: Invalid user henny from 175.24.138.108 port 44737 Jan 7 14:37:41 srv01 sshd[31495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.138.108 Jan 7 14:37:41 srv01 sshd[31495]: Invalid user henny from 175.24.138.108 port 44737 Jan 7 14:37:42 srv01 sshd[31495]: Failed password for invalid user henny from 175.24.138.108 port 44737 ssh2 Jan 7 14:40:22 srv01 sshd[31810]: Invalid user vn from 175.24.138.108 port 59961 ... |
2020-01-07 21:59:20 |
| 114.119.128.71 | attackbots | badbot |
2020-01-07 22:26:54 |
| 92.118.161.13 | attackspam | Unauthorized connection attempt detected from IP address 92.118.161.13 to port 993 [J] |
2020-01-07 22:13:01 |
| 192.185.12.38 | attackspambots | Triggering PHP malware |
2020-01-07 22:09:08 |