City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.134.18.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;253.134.18.136. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024121000 1800 900 604800 86400
;; Query time: 190 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 10 16:00:10 CST 2024
;; MSG SIZE rcvd: 107
Host 136.18.134.253.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 136.18.134.253.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
78.128.113.116 | attackspambots | Jun 20 16:20:49 mail.srvfarm.net postfix/smtpd[2710155]: warning: unknown[78.128.113.116]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 20 16:20:49 mail.srvfarm.net postfix/smtpd[2710155]: lost connection after AUTH from unknown[78.128.113.116] Jun 20 16:20:55 mail.srvfarm.net postfix/smtpd[2710194]: lost connection after AUTH from unknown[78.128.113.116] Jun 20 16:21:00 mail.srvfarm.net postfix/smtpd[2710624]: lost connection after AUTH from unknown[78.128.113.116] Jun 20 16:21:06 mail.srvfarm.net postfix/smtpd[2696680]: lost connection after AUTH from unknown[78.128.113.116] |
2020-06-21 04:51:06 |
41.39.130.142 | attackspambots | Unauthorized connection attempt from IP address 41.39.130.142 on Port 445(SMB) |
2020-06-21 05:10:23 |
122.144.211.235 | attackspam | Jun 20 22:15:33 pve1 sshd[10461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.211.235 Jun 20 22:15:35 pve1 sshd[10461]: Failed password for invalid user sakamoto from 122.144.211.235 port 37766 ssh2 ... |
2020-06-21 05:08:19 |
116.196.107.128 | attackspam | SSH Brute-Forcing (server1) |
2020-06-21 05:00:15 |
195.54.161.125 | attackbotsspam | 06/20/2020-16:46:03.831129 195.54.161.125 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-06-21 04:47:09 |
178.32.221.142 | attackspambots | Jun 20 22:26:42 piServer sshd[15028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.221.142 Jun 20 22:26:43 piServer sshd[15028]: Failed password for invalid user kai from 178.32.221.142 port 33148 ssh2 Jun 20 22:32:09 piServer sshd[15408]: Failed password for root from 178.32.221.142 port 33945 ssh2 ... |
2020-06-21 04:40:14 |
82.130.246.74 | attack | Jun 20 22:39:10 piServer sshd[16032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.130.246.74 Jun 20 22:39:11 piServer sshd[16032]: Failed password for invalid user rosana from 82.130.246.74 port 45128 ssh2 Jun 20 22:40:51 piServer sshd[16191]: Failed password for root from 82.130.246.74 port 46658 ssh2 ... |
2020-06-21 05:04:38 |
2.42.255.171 | attackbots | Honeypot attack, port: 81, PTR: net-2-42-255-171.cust.vodafonedsl.it. |
2020-06-21 05:11:12 |
218.17.185.31 | attackspambots | Jun 20 22:02:28 Ubuntu-1404-trusty-64-minimal sshd\[7179\]: Invalid user ase from 218.17.185.31 Jun 20 22:02:28 Ubuntu-1404-trusty-64-minimal sshd\[7179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.17.185.31 Jun 20 22:02:30 Ubuntu-1404-trusty-64-minimal sshd\[7179\]: Failed password for invalid user ase from 218.17.185.31 port 53890 ssh2 Jun 20 22:15:52 Ubuntu-1404-trusty-64-minimal sshd\[13739\]: Invalid user guest3 from 218.17.185.31 Jun 20 22:15:52 Ubuntu-1404-trusty-64-minimal sshd\[13739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.17.185.31 |
2020-06-21 04:45:16 |
144.76.176.171 | attack | 20 attempts against mh-misbehave-ban on pluto |
2020-06-21 05:12:08 |
185.168.41.13 | attackbots | Unauthorized connection attempt from IP address 185.168.41.13 on Port 445(SMB) |
2020-06-21 04:55:58 |
61.231.244.47 | attack | 1592684129 - 06/20/2020 22:15:29 Host: 61.231.244.47/61.231.244.47 Port: 445 TCP Blocked |
2020-06-21 05:17:33 |
114.67.206.90 | attackbots | Jun 20 22:12:19 buvik sshd[7534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.206.90 Jun 20 22:12:20 buvik sshd[7534]: Failed password for invalid user testuser from 114.67.206.90 port 42938 ssh2 Jun 20 22:15:33 buvik sshd[8014]: Invalid user gaa from 114.67.206.90 ... |
2020-06-21 05:09:53 |
49.49.57.66 | attackbots | Unauthorized connection attempt from IP address 49.49.57.66 on Port 445(SMB) |
2020-06-21 04:54:11 |
148.71.44.11 | attack | Jun 20 23:09:37 ift sshd\[50056\]: Invalid user select from 148.71.44.11Jun 20 23:09:39 ift sshd\[50056\]: Failed password for invalid user select from 148.71.44.11 port 48309 ssh2Jun 20 23:12:49 ift sshd\[50658\]: Failed password for root from 148.71.44.11 port 48322 ssh2Jun 20 23:15:49 ift sshd\[51111\]: Invalid user hiperg from 148.71.44.11Jun 20 23:15:51 ift sshd\[51111\]: Failed password for invalid user hiperg from 148.71.44.11 port 48336 ssh2 ... |
2020-06-21 04:47:31 |