City: Aktobe
Region: Aktyubinskaya Oblast'
Country: Kazakhstan
Internet Service Provider: Kazakhtelecom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.134.62.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 616
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.134.62.92. IN A
;; AUTHORITY SECTION:
. 258 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022061401 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 15 09:31:55 CST 2022
;; MSG SIZE rcvd: 104
92.62.134.2.in-addr.arpa domain name pointer 2.134.62.92.megaline.telecom.kz.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
92.62.134.2.in-addr.arpa name = 2.134.62.92.megaline.telecom.kz.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 141.98.81.81 | attackspam | $f2bV_matches |
2020-05-16 19:37:44 |
| 139.59.188.207 | attack | May 15 17:56:34 icinga sshd[41014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.188.207 May 15 17:56:37 icinga sshd[41014]: Failed password for invalid user zzh from 139.59.188.207 port 40814 ssh2 May 15 18:06:32 icinga sshd[57300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.188.207 ... |
2020-05-16 19:19:02 |
| 116.112.64.98 | attackbots | 2020-05-16T02:55:14.057127shield sshd\[1022\]: Invalid user dck from 116.112.64.98 port 56616 2020-05-16T02:55:14.066667shield sshd\[1022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.112.64.98 2020-05-16T02:55:16.033921shield sshd\[1022\]: Failed password for invalid user dck from 116.112.64.98 port 56616 ssh2 2020-05-16T02:58:41.308361shield sshd\[1766\]: Invalid user brady from 116.112.64.98 port 47180 2020-05-16T02:58:41.311819shield sshd\[1766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.112.64.98 |
2020-05-16 19:50:00 |
| 196.188.42.130 | attackbotsspam | Invalid user test from 196.188.42.130 port 43544 |
2020-05-16 19:19:33 |
| 51.254.143.190 | attack | May 16 05:36:43 lukav-desktop sshd\[17097\]: Invalid user fe from 51.254.143.190 May 16 05:36:43 lukav-desktop sshd\[17097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.143.190 May 16 05:36:45 lukav-desktop sshd\[17097\]: Failed password for invalid user fe from 51.254.143.190 port 60709 ssh2 May 16 05:41:35 lukav-desktop sshd\[17285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.143.190 user=root May 16 05:41:37 lukav-desktop sshd\[17285\]: Failed password for root from 51.254.143.190 port 52599 ssh2 |
2020-05-16 19:30:27 |
| 61.151.130.20 | attackspambots | $f2bV_matches |
2020-05-16 19:45:20 |
| 119.27.189.46 | attack | May 16 04:35:17 vpn01 sshd[32495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.189.46 May 16 04:35:19 vpn01 sshd[32495]: Failed password for invalid user nas from 119.27.189.46 port 46554 ssh2 ... |
2020-05-16 19:46:29 |
| 83.167.87.198 | attackbots | May 16 10:55:21 localhost sshd[2961676]: Invalid user condo from 83.167.87.198 port 40827 ... |
2020-05-16 19:34:48 |
| 31.14.194.169 | attack | Connection by 31.14.194.169 on port: 23 got caught by honeypot at 5/15/2020 8:53:27 AM |
2020-05-16 19:34:03 |
| 195.224.138.61 | attackbotsspam | May 16 05:30:19 ift sshd\[18870\]: Invalid user ts3server from 195.224.138.61May 16 05:30:22 ift sshd\[18870\]: Failed password for invalid user ts3server from 195.224.138.61 port 58588 ssh2May 16 05:36:13 ift sshd\[20143\]: Invalid user teamspeak from 195.224.138.61May 16 05:36:15 ift sshd\[20143\]: Failed password for invalid user teamspeak from 195.224.138.61 port 38124 ssh2May 16 05:39:29 ift sshd\[20446\]: Failed password for root from 195.224.138.61 port 45334 ssh2 ... |
2020-05-16 19:09:46 |
| 198.57.247.237 | attackbotsspam | Fail2Ban Ban Triggered |
2020-05-16 19:47:46 |
| 59.127.112.220 | attack | Honeypot attack, port: 81, PTR: 59-127-112-220.HINET-IP.hinet.net. |
2020-05-16 19:21:11 |
| 67.205.155.68 | attack | May 16 07:46:39 gw1 sshd[4424]: Failed password for root from 67.205.155.68 port 37552 ssh2 ... |
2020-05-16 19:12:06 |
| 139.59.93.93 | attackspam | May 16 00:23:48 ws26vmsma01 sshd[152098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.93.93 May 16 00:23:50 ws26vmsma01 sshd[152098]: Failed password for invalid user wallet from 139.59.93.93 port 35050 ssh2 ... |
2020-05-16 19:49:30 |
| 106.54.114.164 | attackbots | 2020-05-16T02:55:31.034171shield sshd\[1088\]: Invalid user postgres from 106.54.114.164 port 40974 2020-05-16T02:55:31.043713shield sshd\[1088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.114.164 2020-05-16T02:55:32.674643shield sshd\[1088\]: Failed password for invalid user postgres from 106.54.114.164 port 40974 ssh2 2020-05-16T02:57:41.077478shield sshd\[1590\]: Invalid user wocloud from 106.54.114.164 port 36258 2020-05-16T02:57:41.091622shield sshd\[1590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.114.164 |
2020-05-16 19:53:41 |