City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.10.134.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38979
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;31.10.134.107. IN A
;; AUTHORITY SECTION:
. 280 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:30:18 CST 2022
;; MSG SIZE rcvd: 106
107.134.10.31.in-addr.arpa domain name pointer 31-10-134-107.cgn.dynamic.upc.ch.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
107.134.10.31.in-addr.arpa name = 31-10-134-107.cgn.dynamic.upc.ch.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
60.4.214.185 | attack | 1594808136 - 07/15/2020 12:15:36 Host: 60.4.214.185/60.4.214.185 Port: 23 TCP Blocked |
2020-07-15 20:09:41 |
13.90.57.49 | attackspam | Jul 15 14:35:46 root sshd[21833]: Invalid user william from 13.90.57.49 ... |
2020-07-15 19:56:41 |
183.82.96.185 | attackbotsspam | Unauthorized connection attempt from IP address 183.82.96.185 on Port 445(SMB) |
2020-07-15 20:23:28 |
52.172.220.173 | attackbots | Jul 15 14:05:30 nextcloud sshd\[29840\]: Invalid user nak from 52.172.220.173 Jul 15 14:05:30 nextcloud sshd\[29840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.220.173 Jul 15 14:05:30 nextcloud sshd\[29842\]: Invalid user sued from 52.172.220.173 Jul 15 14:05:30 nextcloud sshd\[29841\]: Invalid user lookup from 52.172.220.173 Jul 15 14:05:30 nextcloud sshd\[29842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.220.173 Jul 15 14:05:30 nextcloud sshd\[29841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.220.173 Jul 15 14:05:30 nextcloud sshd\[29847\]: Invalid user nc-lookup.nak-sued.de from 52.172.220.173 Jul 15 14:05:30 nextcloud sshd\[29847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.172.220.173 |
2020-07-15 20:12:23 |
80.20.133.206 | attack | Jul 15 12:15:28 nextcloud sshd\[17058\]: Invalid user phil from 80.20.133.206 Jul 15 12:15:28 nextcloud sshd\[17058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.20.133.206 Jul 15 12:15:30 nextcloud sshd\[17058\]: Failed password for invalid user phil from 80.20.133.206 port 43092 ssh2 |
2020-07-15 20:19:05 |
119.152.242.180 | attackbots | 20/7/15@06:15:36: FAIL: Alarm-Intrusion address from=119.152.242.180 ... |
2020-07-15 20:08:05 |
92.62.131.106 | attack | Jul 15 13:17:56 nextcloud sshd\[32367\]: Invalid user dell from 92.62.131.106 Jul 15 13:17:56 nextcloud sshd\[32367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.62.131.106 Jul 15 13:17:58 nextcloud sshd\[32367\]: Failed password for invalid user dell from 92.62.131.106 port 40096 ssh2 |
2020-07-15 19:50:18 |
13.72.73.88 | attackbots | Jul 15 14:00:38 minden010 sshd[28928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.72.73.88 Jul 15 14:00:38 minden010 sshd[28930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.72.73.88 Jul 15 14:00:38 minden010 sshd[28929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.72.73.88 ... |
2020-07-15 20:02:05 |
180.115.25.86 | attackspambots | MVPower DVR TV Shell Unauthenticated Command Execution Vulnerability |
2020-07-15 20:16:51 |
192.241.237.57 | attackspambots | 192.241.237.57 - - [15/Jul/2020:06:04:24 -0500] "GET https://www.ad5gb.com/ HTTP/1.1" 400 346 000 0 0 0 130 295 0 0 0 NONE FIN FIN ERR_INVALID_REQ |
2020-07-15 20:12:57 |
34.67.172.19 | attackbotsspam | Jul 15 06:15:42 lanister sshd[30386]: Invalid user edu from 34.67.172.19 Jul 15 06:15:42 lanister sshd[30386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.67.172.19 Jul 15 06:15:42 lanister sshd[30386]: Invalid user edu from 34.67.172.19 Jul 15 06:15:44 lanister sshd[30386]: Failed password for invalid user edu from 34.67.172.19 port 52344 ssh2 |
2020-07-15 19:58:27 |
45.225.123.43 | attackbotsspam | Unauthorized connection attempt from IP address 45.225.123.43 on Port 445(SMB) |
2020-07-15 20:14:26 |
14.232.74.169 | attack | Unauthorized connection attempt from IP address 14.232.74.169 on Port 445(SMB) |
2020-07-15 20:06:33 |
14.99.61.229 | attackbots | Honeypot attack, port: 445, PTR: static-229.61.99.14-tataidc.co.in. |
2020-07-15 20:18:32 |
172.245.191.142 | attack | 11,46-01/02 [bc01/m25] PostRequest-Spammer scoring: Durban01 |
2020-07-15 20:11:09 |