City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.134.105.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13598
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.134.105.125. IN A
;; AUTHORITY SECTION:
. 230 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023050501 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 06 12:31:25 CST 2023
;; MSG SIZE rcvd: 108
Host 125.105.134.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 125.105.134.242.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
186.147.160.195 | attackbots | May 14 05:52:24 jane sshd[23722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.160.195 May 14 05:52:26 jane sshd[23722]: Failed password for invalid user user from 186.147.160.195 port 40942 ssh2 ... |
2020-05-14 14:08:39 |
201.132.119.2 | attack | 2020-05-14T06:08:18.486255shield sshd\[27522\]: Invalid user user from 201.132.119.2 port 15829 2020-05-14T06:08:18.565570shield sshd\[27522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.132.119.2 2020-05-14T06:08:20.717496shield sshd\[27522\]: Failed password for invalid user user from 201.132.119.2 port 15829 ssh2 2020-05-14T06:10:35.203170shield sshd\[28005\]: Invalid user deploy from 201.132.119.2 port 64353 2020-05-14T06:10:35.213254shield sshd\[28005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.132.119.2 |
2020-05-14 14:35:23 |
142.44.185.242 | attackspam | 2020-05-14T06:07:50.580062abusebot-6.cloudsearch.cf sshd[17972]: Invalid user zabbix from 142.44.185.242 port 60210 2020-05-14T06:07:50.588008abusebot-6.cloudsearch.cf sshd[17972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip242.ip-142-44-185.net 2020-05-14T06:07:50.580062abusebot-6.cloudsearch.cf sshd[17972]: Invalid user zabbix from 142.44.185.242 port 60210 2020-05-14T06:07:52.899786abusebot-6.cloudsearch.cf sshd[17972]: Failed password for invalid user zabbix from 142.44.185.242 port 60210 ssh2 2020-05-14T06:11:33.682429abusebot-6.cloudsearch.cf sshd[18205]: Invalid user oracle from 142.44.185.242 port 39902 2020-05-14T06:11:33.689637abusebot-6.cloudsearch.cf sshd[18205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip242.ip-142-44-185.net 2020-05-14T06:11:33.682429abusebot-6.cloudsearch.cf sshd[18205]: Invalid user oracle from 142.44.185.242 port 39902 2020-05-14T06:11:35.277662abusebot-6.clou ... |
2020-05-14 14:24:08 |
104.27.178.23 | attack | https://andgeraper.xyz/troy_xoiLpOkM4d3tToEM0bSLxKxh4dAq73iL7anM4Qoh0I7MBYB- |
2020-05-14 14:27:00 |
222.211.87.16 | attack | May 14 05:54:31 ip-172-31-62-245 sshd\[31940\]: Failed password for root from 222.211.87.16 port 2386 ssh2\ May 14 05:56:12 ip-172-31-62-245 sshd\[31970\]: Invalid user newsletter from 222.211.87.16\ May 14 05:56:14 ip-172-31-62-245 sshd\[31970\]: Failed password for invalid user newsletter from 222.211.87.16 port 2387 ssh2\ May 14 05:57:50 ip-172-31-62-245 sshd\[31987\]: Invalid user dst from 222.211.87.16\ May 14 05:57:52 ip-172-31-62-245 sshd\[31987\]: Failed password for invalid user dst from 222.211.87.16 port 2388 ssh2\ |
2020-05-14 14:20:56 |
49.235.72.141 | attackbotsspam | May 14 04:31:42 raspberrypi sshd\[11369\]: Invalid user cop from 49.235.72.141May 14 04:31:44 raspberrypi sshd\[11369\]: Failed password for invalid user cop from 49.235.72.141 port 37422 ssh2May 14 04:40:45 raspberrypi sshd\[17456\]: Invalid user dropbox from 49.235.72.141 ... |
2020-05-14 14:20:41 |
118.25.104.48 | attackspam | May 14 05:51:47 vpn01 sshd[11101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.104.48 May 14 05:51:49 vpn01 sshd[11101]: Failed password for invalid user alias from 118.25.104.48 port 42797 ssh2 ... |
2020-05-14 14:34:40 |
171.228.240.121 | attackspam | Excessive Port-Scanning |
2020-05-14 14:10:15 |
64.227.30.91 | attackspambots | May 14 08:42:34 pkdns2 sshd\[3956\]: Invalid user admin from 64.227.30.91May 14 08:42:36 pkdns2 sshd\[3956\]: Failed password for invalid user admin from 64.227.30.91 port 55354 ssh2May 14 08:46:54 pkdns2 sshd\[4181\]: Invalid user stephen1 from 64.227.30.91May 14 08:46:56 pkdns2 sshd\[4181\]: Failed password for invalid user stephen1 from 64.227.30.91 port 35830 ssh2May 14 08:51:18 pkdns2 sshd\[4446\]: Invalid user postgres from 64.227.30.91May 14 08:51:19 pkdns2 sshd\[4446\]: Failed password for invalid user postgres from 64.227.30.91 port 44538 ssh2 ... |
2020-05-14 14:35:08 |
181.44.184.50 | attack | May 14 05:51:41 mellenthin postfix/smtpd[17075]: NOQUEUE: reject: RCPT from unknown[181.44.184.50]: 554 5.7.1 Service unavailable; Client host [181.44.184.50] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/181.44.184.50; from= |
2020-05-14 14:44:00 |
108.12.130.32 | attack | May 14 06:08:59 minden010 sshd[15714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.12.130.32 May 14 06:09:01 minden010 sshd[15714]: Failed password for invalid user user from 108.12.130.32 port 57634 ssh2 May 14 06:18:25 minden010 sshd[20307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.12.130.32 ... |
2020-05-14 14:10:52 |
196.38.70.24 | attackspam | May 14 02:55:21 vps46666688 sshd[3956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.38.70.24 May 14 02:55:23 vps46666688 sshd[3956]: Failed password for invalid user jj from 196.38.70.24 port 27224 ssh2 ... |
2020-05-14 14:22:46 |
134.122.76.222 | attackspam | Invalid user user from 134.122.76.222 port 57358 |
2020-05-14 14:18:49 |
195.248.243.219 | attackspam | [portscan] tcp/3389 [MS RDP] *(RWIN=1024)(05140756) |
2020-05-14 14:42:24 |
222.186.30.112 | attackspam | May 14 08:22:28 vmanager6029 sshd\[14384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112 user=root May 14 08:22:30 vmanager6029 sshd\[14382\]: error: PAM: Authentication failure for root from 222.186.30.112 May 14 08:22:30 vmanager6029 sshd\[14387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112 user=root |
2020-05-14 14:30:27 |