City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 19.64.135.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44769
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;19.64.135.22. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 17:38:01 CST 2025
;; MSG SIZE rcvd: 105
Host 22.135.64.19.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 22.135.64.19.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 34.243.249.134 | attackbots | Host Scan |
2019-12-29 15:20:58 |
| 218.92.0.168 | attackbotsspam | Dec 29 01:41:34 plusreed sshd[24615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168 user=root Dec 29 01:41:35 plusreed sshd[24615]: Failed password for root from 218.92.0.168 port 28204 ssh2 Dec 29 01:41:39 plusreed sshd[24615]: Failed password for root from 218.92.0.168 port 28204 ssh2 Dec 29 01:41:34 plusreed sshd[24615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168 user=root Dec 29 01:41:35 plusreed sshd[24615]: Failed password for root from 218.92.0.168 port 28204 ssh2 Dec 29 01:41:39 plusreed sshd[24615]: Failed password for root from 218.92.0.168 port 28204 ssh2 Dec 29 01:41:34 plusreed sshd[24615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.168 user=root Dec 29 01:41:35 plusreed sshd[24615]: Failed password for root from 218.92.0.168 port 28204 ssh2 Dec 29 01:41:39 plusreed sshd[24615]: Failed password for root from 218.92.0.168 port 282 |
2019-12-29 14:41:56 |
| 95.8.65.149 | attackspambots | 19/12/29@01:30:05: FAIL: Alarm-Telnet address from=95.8.65.149 ... |
2019-12-29 15:10:43 |
| 132.232.126.28 | attackspam | 2019-12-29T06:42:55.079200shield sshd\[12505\]: Invalid user admin from 132.232.126.28 port 35270 2019-12-29T06:42:55.083496shield sshd\[12505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.126.28 2019-12-29T06:42:57.220810shield sshd\[12505\]: Failed password for invalid user admin from 132.232.126.28 port 35270 ssh2 2019-12-29T06:46:03.429845shield sshd\[13224\]: Invalid user apache from 132.232.126.28 port 57020 2019-12-29T06:46:03.433868shield sshd\[13224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.126.28 |
2019-12-29 14:52:49 |
| 41.223.4.155 | attackspambots | Automatic report - SSH Brute-Force Attack |
2019-12-29 14:28:50 |
| 106.12.45.108 | attackspam | Dec 29 07:43:29 srv-ubuntu-dev3 sshd[120373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.45.108 user=root Dec 29 07:43:32 srv-ubuntu-dev3 sshd[120373]: Failed password for root from 106.12.45.108 port 34640 ssh2 Dec 29 07:47:14 srv-ubuntu-dev3 sshd[120681]: Invalid user mammel from 106.12.45.108 Dec 29 07:47:14 srv-ubuntu-dev3 sshd[120681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.45.108 Dec 29 07:47:14 srv-ubuntu-dev3 sshd[120681]: Invalid user mammel from 106.12.45.108 Dec 29 07:47:16 srv-ubuntu-dev3 sshd[120681]: Failed password for invalid user mammel from 106.12.45.108 port 56808 ssh2 Dec 29 07:50:41 srv-ubuntu-dev3 sshd[120929]: Invalid user smmsp from 106.12.45.108 Dec 29 07:50:41 srv-ubuntu-dev3 sshd[120929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.45.108 Dec 29 07:50:41 srv-ubuntu-dev3 sshd[120929]: Invalid user smmsp ... |
2019-12-29 14:55:04 |
| 49.14.121.81 | attack | Dec 29 07:30:03 mail kernel: [2620745.948532] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=49.14.121.81 DST=91.205.173.180 LEN=52 TOS=0x08 PREC=0x00 TTL=51 ID=26183 DF PROTO=TCP SPT=58604 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 Dec 29 07:30:06 mail kernel: [2620748.935141] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=49.14.121.81 DST=91.205.173.180 LEN=52 TOS=0x08 PREC=0x00 TTL=51 ID=26907 DF PROTO=TCP SPT=58604 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 Dec 29 07:30:12 mail kernel: [2620754.896086] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=49.14.121.81 DST=91.205.173.180 LEN=48 TOS=0x08 PREC=0x00 TTL=51 ID=28199 DF PROTO=TCP SPT=58604 DPT=1433 WINDOW=65535 RES=0x00 SYN URGP=0 |
2019-12-29 15:04:21 |
| 222.186.180.17 | attackspambots | $f2bV_matches |
2019-12-29 14:41:30 |
| 41.38.50.147 | attackbots | 19/12/29@01:31:01: FAIL: IoT-Telnet address from=41.38.50.147 ... |
2019-12-29 14:47:25 |
| 222.186.175.147 | attack | Dec 29 08:11:17 eventyay sshd[16705]: Failed password for root from 222.186.175.147 port 25418 ssh2 Dec 29 08:11:31 eventyay sshd[16705]: error: maximum authentication attempts exceeded for root from 222.186.175.147 port 25418 ssh2 [preauth] Dec 29 08:11:37 eventyay sshd[16708]: Failed password for root from 222.186.175.147 port 52364 ssh2 ... |
2019-12-29 15:22:31 |
| 47.17.177.110 | attackbots | Dec 29 07:22:23 lnxded64 sshd[16845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.17.177.110 Dec 29 07:22:25 lnxded64 sshd[16845]: Failed password for invalid user pulgar from 47.17.177.110 port 43732 ssh2 Dec 29 07:30:45 lnxded64 sshd[18944]: Failed password for zabbix from 47.17.177.110 port 38584 ssh2 |
2019-12-29 15:04:46 |
| 121.204.185.106 | attack | Automatic report - Banned IP Access |
2019-12-29 15:20:34 |
| 192.99.32.86 | attackspam | Dec 29 07:19:24 localhost sshd[7609]: Failed password for invalid user ubnt from 192.99.32.86 port 52752 ssh2 Dec 29 07:29:08 localhost sshd[8124]: Failed password for invalid user tippy from 192.99.32.86 port 51754 ssh2 Dec 29 07:32:00 localhost sshd[8231]: Failed password for root from 192.99.32.86 port 55910 ssh2 |
2019-12-29 15:00:54 |
| 185.164.0.80 | attack | Automatic report - Banned IP Access |
2019-12-29 15:08:31 |
| 201.189.39.254 | attack | Automatic report - Port Scan Attack |
2019-12-29 15:18:21 |