City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.196.136.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39804
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;3.196.136.134. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:52:18 CST 2025
;; MSG SIZE rcvd: 106
Host 134.136.196.3.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 134.136.196.3.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 172.94.53.137 | attack | Nov 22 06:41:52 tdfoods sshd\[8513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.94.53.137 user=root Nov 22 06:41:54 tdfoods sshd\[8513\]: Failed password for root from 172.94.53.137 port 48860 ssh2 Nov 22 06:49:14 tdfoods sshd\[9118\]: Invalid user endy from 172.94.53.137 Nov 22 06:49:14 tdfoods sshd\[9118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.94.53.137 Nov 22 06:49:16 tdfoods sshd\[9118\]: Failed password for invalid user endy from 172.94.53.137 port 38463 ssh2 |
2019-11-23 06:32:50 |
| 182.111.49.196 | attack | badbot |
2019-11-23 05:55:12 |
| 90.76.247.29 | attack | Nov 22 15:44:06 amit sshd\[19712\]: Invalid user admin from 90.76.247.29 Nov 22 15:44:06 amit sshd\[19712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.76.247.29 Nov 22 15:44:08 amit sshd\[19712\]: Failed password for invalid user admin from 90.76.247.29 port 43776 ssh2 ... |
2019-11-23 06:15:28 |
| 45.146.203.112 | attackbots | Autoban 45.146.203.112 AUTH/CONNECT |
2019-11-23 06:03:10 |
| 217.112.128.178 | attack | Postfix DNSBL listed. Trying to send SPAM. |
2019-11-23 05:56:47 |
| 104.197.75.152 | attackbotsspam | 104.197.75.152 - - \[22/Nov/2019:22:04:46 +0100\] "POST /wp-login.php HTTP/1.0" 200 5269 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 104.197.75.152 - - \[22/Nov/2019:22:04:49 +0100\] "POST /wp-login.php HTTP/1.0" 200 5099 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" 104.197.75.152 - - \[22/Nov/2019:22:04:52 +0100\] "POST /wp-login.php HTTP/1.0" 200 5093 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-11-23 06:00:35 |
| 110.77.196.121 | attackspambots | Nov 22 15:24:27 linuxrulz sshd[4117]: Invalid user admin from 110.77.196.121 port 32861 Nov 22 15:24:27 linuxrulz sshd[4117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.77.196.121 Nov 22 15:24:29 linuxrulz sshd[4117]: Failed password for invalid user admin from 110.77.196.121 port 32861 ssh2 Nov 22 15:24:30 linuxrulz sshd[4117]: Connection closed by 110.77.196.121 port 32861 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=110.77.196.121 |
2019-11-23 06:02:26 |
| 106.124.137.103 | attackspam | Tried sshing with brute force. |
2019-11-23 05:55:51 |
| 103.26.99.114 | attackspambots | Brute-force attempt banned |
2019-11-23 06:35:21 |
| 91.134.141.89 | attack | Nov 22 21:03:59 SilenceServices sshd[13920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.141.89 Nov 22 21:04:01 SilenceServices sshd[13920]: Failed password for invalid user abele from 91.134.141.89 port 54740 ssh2 Nov 22 21:07:00 SilenceServices sshd[17703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.141.89 |
2019-11-23 06:26:20 |
| 51.38.176.147 | attack | Nov 22 20:26:46 *** sshd[12060]: Failed password for invalid user hoshi from 51.38.176.147 port 53977 ssh2 Nov 22 20:49:06 *** sshd[12419]: Failed password for invalid user zordo from 51.38.176.147 port 35187 ssh2 Nov 22 20:52:23 *** sshd[12446]: Failed password for invalid user home from 51.38.176.147 port 53314 ssh2 Nov 22 20:55:41 *** sshd[12481]: Failed password for invalid user lurleen from 51.38.176.147 port 43205 ssh2 Nov 22 20:59:07 *** sshd[12519]: Failed password for invalid user mysql from 51.38.176.147 port 33098 ssh2 Nov 22 21:05:57 *** sshd[12669]: Failed password for invalid user mysql from 51.38.176.147 port 41119 ssh2 Nov 22 21:09:28 *** sshd[12760]: Failed password for invalid user console from 51.38.176.147 port 59245 ssh2 Nov 22 21:16:17 *** sshd[12827]: Failed password for invalid user rackow from 51.38.176.147 port 39032 ssh2 Nov 22 21:23:11 *** sshd[12956]: Failed password for invalid user yankee from 51.38.176.147 port 47051 ssh2 Nov 22 21:29:54 *** sshd[13044]: Failed password for inv |
2019-11-23 06:13:47 |
| 103.92.104.235 | attackspambots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/103.92.104.235/ ID - 1H : (11) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : ID NAME ASN : ASN136109 IP : 103.92.104.235 CIDR : 103.92.104.0/24 PREFIX COUNT : 1 UNIQUE IP COUNT : 256 ATTACKS DETECTED ASN136109 : 1H - 1 3H - 1 6H - 1 12H - 1 24H - 1 DateTime : 2019-11-22 17:50:40 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN - data recovery |
2019-11-23 05:58:39 |
| 134.209.24.143 | attack | Nov 22 17:38:37 124388 sshd[10959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.24.143 Nov 22 17:38:37 124388 sshd[10959]: Invalid user iosep from 134.209.24.143 port 44914 Nov 22 17:38:38 124388 sshd[10959]: Failed password for invalid user iosep from 134.209.24.143 port 44914 ssh2 Nov 22 17:41:28 124388 sshd[10990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.24.143 user=root Nov 22 17:41:30 124388 sshd[10990]: Failed password for root from 134.209.24.143 port 51326 ssh2 |
2019-11-23 06:37:35 |
| 94.23.149.21 | attackspam | Nov 22 15:36:09 mxgate1 postfix/postscreen[11544]: CONNECT from [94.23.149.21]:57868 to [176.31.12.44]:25 Nov 22 15:36:09 mxgate1 postfix/dnsblog[11547]: addr 94.23.149.21 listed by domain zen.spamhaus.org as 127.0.0.3 Nov 22 15:36:15 mxgate1 postfix/postscreen[11544]: DNSBL rank 2 for [94.23.149.21]:57868 Nov 22 15:36:15 mxgate1 postfix/tlsproxy[11579]: CONNECT from [94.23.149.21]:57868 Nov x@x Nov 22 15:36:15 mxgate1 postfix/postscreen[11544]: DISCONNECT [94.23.149.21]:57868 Nov 22 15:36:15 mxgate1 postfix/tlsproxy[11579]: DISCONNECT [94.23.149.21]:57868 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=94.23.149.21 |
2019-11-23 06:17:42 |
| 66.70.240.214 | attackspam | Unauthorized SSH login attempts |
2019-11-23 06:12:56 |