City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 174.233.148.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;174.233.148.134. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:17:33 CST 2025
;; MSG SIZE rcvd: 108
134.148.233.174.in-addr.arpa domain name pointer 134.sub-174-233-148.myvzw.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
134.148.233.174.in-addr.arpa name = 134.sub-174-233-148.myvzw.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 61.160.107.66 | attackbotsspam | Apr 13 11:35:01 server1 sshd\[22751\]: Invalid user nancy from 61.160.107.66 Apr 13 11:35:01 server1 sshd\[22751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.107.66 Apr 13 11:35:03 server1 sshd\[22751\]: Failed password for invalid user nancy from 61.160.107.66 port 18008 ssh2 Apr 13 11:39:41 server1 sshd\[24090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.160.107.66 user=root Apr 13 11:39:43 server1 sshd\[24090\]: Failed password for root from 61.160.107.66 port 45970 ssh2 ... |
2020-04-14 01:50:12 |
| 178.32.35.79 | attackbots | Apr 13 17:28:00 ip-172-31-61-156 sshd[18305]: Failed password for root from 178.32.35.79 port 37144 ssh2 Apr 13 17:27:58 ip-172-31-61-156 sshd[18305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.35.79 user=root Apr 13 17:28:00 ip-172-31-61-156 sshd[18305]: Failed password for root from 178.32.35.79 port 37144 ssh2 Apr 13 17:32:00 ip-172-31-61-156 sshd[18562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.35.79 user=root Apr 13 17:32:02 ip-172-31-61-156 sshd[18562]: Failed password for root from 178.32.35.79 port 45198 ssh2 ... |
2020-04-14 02:20:10 |
| 106.54.169.194 | attackspam | Port scan detected on ports: 65529[TCP], 65529[TCP], 3389[TCP] |
2020-04-14 01:50:40 |
| 113.62.127.195 | attackbots | CN_APNIC-HM_<177>1586798448 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2]: |
2020-04-14 01:42:52 |
| 138.68.26.48 | attackspam | Brute force attempt |
2020-04-14 01:54:15 |
| 223.71.167.166 | attack | Apr 13 19:20:11 debian-2gb-nbg1-2 kernel: \[9057404.480959\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=223.71.167.166 DST=195.201.40.59 LEN=44 TOS=0x04 PREC=0x00 TTL=114 ID=22698 PROTO=TCP SPT=58638 DPT=2525 WINDOW=29200 RES=0x00 SYN URGP=0 |
2020-04-14 02:14:48 |
| 188.158.127.172 | attackspambots | [portscan] Port scan |
2020-04-14 01:48:38 |
| 162.243.133.158 | attackbotsspam | firewall-block, port(s): 636/tcp |
2020-04-14 02:06:52 |
| 89.247.157.176 | attackbots | prod3 ... |
2020-04-14 01:53:13 |
| 220.167.89.108 | attackspambots | " " |
2020-04-14 01:55:46 |
| 91.212.38.210 | attackspam | SIP Server BruteForce Attack |
2020-04-14 02:19:20 |
| 2.153.212.195 | attackbots | Apr 13 20:12:26 localhost sshd\[19809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.153.212.195 user=root Apr 13 20:12:28 localhost sshd\[19809\]: Failed password for root from 2.153.212.195 port 52388 ssh2 Apr 13 20:16:25 localhost sshd\[20038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.153.212.195 user=root Apr 13 20:16:27 localhost sshd\[20038\]: Failed password for root from 2.153.212.195 port 33758 ssh2 Apr 13 20:20:30 localhost sshd\[20282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.153.212.195 user=root ... |
2020-04-14 02:21:27 |
| 43.242.73.18 | attackbotsspam | SSH brute force attempt |
2020-04-14 01:55:29 |
| 121.229.26.104 | attackspambots | Apr 13 19:43:43 plex sshd[29622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.26.104 user=root Apr 13 19:43:44 plex sshd[29622]: Failed password for root from 121.229.26.104 port 44362 ssh2 |
2020-04-14 01:52:15 |
| 114.106.156.193 | attack | Apr 14 03:16:04 our-server-hostname postfix/smtpd[2470]: connect from unknown[114.106.156.193] Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=114.106.156.193 |
2020-04-14 01:44:52 |