City: Jakarta
Region: Jakarta Raya
Country: Indonesia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 31.13.95.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15258
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;31.13.95.34. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025040702 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 08 09:35:59 CST 2025
;; MSG SIZE rcvd: 104
34.95.13.31.in-addr.arpa domain name pointer edge-mqtt-mini-shv-02-cgk1.facebook.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
34.95.13.31.in-addr.arpa name = edge-mqtt-mini-shv-02-cgk1.facebook.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
211.20.181.186 | attackspambots | Apr 6 12:20:28 sip sshd[21383]: Failed password for root from 211.20.181.186 port 1344 ssh2 Apr 6 12:27:18 sip sshd[23905]: Failed password for root from 211.20.181.186 port 56682 ssh2 |
2020-04-06 20:45:25 |
96.69.158.193 | attackspam | Unauthorized connection attempt detected from IP address 96.69.158.193 to port 80 |
2020-04-06 20:40:32 |
140.143.206.137 | attackbots | Apr 6 05:37:41 IngegnereFirenze sshd[22914]: User root from 140.143.206.137 not allowed because not listed in AllowUsers ... |
2020-04-06 20:16:52 |
156.236.74.178 | attack | 2020-04-06T13:19:36.740519ns386461 sshd\[11865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.74.178 user=root 2020-04-06T13:19:38.544917ns386461 sshd\[11865\]: Failed password for root from 156.236.74.178 port 60073 ssh2 2020-04-06T13:27:43.838206ns386461 sshd\[19386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.74.178 user=root 2020-04-06T13:27:45.496216ns386461 sshd\[19386\]: Failed password for root from 156.236.74.178 port 59484 ssh2 2020-04-06T13:31:41.146588ns386461 sshd\[23311\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.74.178 user=root ... |
2020-04-06 20:05:14 |
120.237.159.248 | attack | Automatic report BANNED IP |
2020-04-06 20:29:02 |
51.38.37.89 | attackspam | Apr 6 12:06:07 vmd48417 sshd[28144]: Failed password for root from 51.38.37.89 port 53366 ssh2 |
2020-04-06 20:12:42 |
104.236.250.88 | attackspambots | Apr 5 22:33:54 server sshd\[18524\]: Failed password for invalid user \~\#$%\^\&\*\(\),.\; from 104.236.250.88 port 42298 ssh2 Apr 6 10:20:22 server sshd\[13974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.250.88 user=root Apr 6 10:20:24 server sshd\[13974\]: Failed password for root from 104.236.250.88 port 52660 ssh2 Apr 6 10:29:01 server sshd\[15959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.250.88 user=root Apr 6 10:29:03 server sshd\[15959\]: Failed password for root from 104.236.250.88 port 56538 ssh2 ... |
2020-04-06 20:10:11 |
109.226.213.125 | attackbots | Apr 6 11:46:18 our-server-hostname postfix/smtpd[22048]: connect from unknown[109.226.213.125] Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=109.226.213.125 |
2020-04-06 20:11:23 |
158.69.194.115 | attack | $f2bV_matches |
2020-04-06 20:07:06 |
45.156.21.60 | attackspam | (sshd) Failed SSH login from 45.156.21.60 (RU/Russia/-): 5 in the last 3600 secs |
2020-04-06 20:29:25 |
201.221.186.113 | attackbotsspam | detected by Fail2Ban |
2020-04-06 20:16:04 |
134.209.178.109 | attackbotsspam | $f2bV_matches |
2020-04-06 20:17:14 |
185.95.204.42 | attack | Lines containing failures of 185.95.204.42 Apr 6 00:19:41 shared11 sshd[3360]: Invalid user admin1 from 185.95.204.42 port 48262 Apr 6 00:19:42 shared11 sshd[3360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.95.204.42 Apr 6 00:19:43 shared11 sshd[3360]: Failed password for invalid user admin1 from 185.95.204.42 port 48262 ssh2 Apr 6 00:19:44 shared11 sshd[3360]: Connection closed by invalid user admin1 185.95.204.42 port 48262 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=185.95.204.42 |
2020-04-06 20:07:47 |
206.189.24.67 | attack | [ssh] SSH attack |
2020-04-06 20:28:10 |
41.221.168.168 | attackspambots | 2020-04-06T05:45:30.599813Z 03451c0517ee New connection: 41.221.168.168:59002 (172.17.0.4:2222) [session: 03451c0517ee] 2020-04-06T05:54:28.446673Z 3a1e4712dc35 New connection: 41.221.168.168:41512 (172.17.0.4:2222) [session: 3a1e4712dc35] |
2020-04-06 20:22:39 |