City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.132.116.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61970
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;34.132.116.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 19:24:25 CST 2025
;; MSG SIZE rcvd: 107
142.116.132.34.in-addr.arpa domain name pointer 142.116.132.34.bc.googleusercontent.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.116.132.34.in-addr.arpa name = 142.116.132.34.bc.googleusercontent.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 178.33.233.54 | attackspam | vps1:sshd-InvalidUser |
2019-08-22 04:44:53 |
| 182.219.172.224 | attack | Aug 21 20:36:57 areeb-Workstation sshd\[16906\]: Invalid user zfxu from 182.219.172.224 Aug 21 20:36:57 areeb-Workstation sshd\[16906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.219.172.224 Aug 21 20:36:59 areeb-Workstation sshd\[16906\]: Failed password for invalid user zfxu from 182.219.172.224 port 56950 ssh2 ... |
2019-08-22 04:57:28 |
| 165.227.159.16 | attackbots | vps1:sshd-InvalidUser |
2019-08-22 05:10:29 |
| 206.189.136.160 | attack | Aug 21 22:54:19 vpn01 sshd\[3783\]: Invalid user r00t from 206.189.136.160 Aug 21 22:54:19 vpn01 sshd\[3783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.136.160 Aug 21 22:54:21 vpn01 sshd\[3783\]: Failed password for invalid user r00t from 206.189.136.160 port 51184 ssh2 |
2019-08-22 04:55:21 |
| 114.67.68.224 | attackspambots | Aug 21 18:47:53 SilenceServices sshd[9761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.68.224 Aug 21 18:47:55 SilenceServices sshd[9761]: Failed password for invalid user audio from 114.67.68.224 port 44186 ssh2 Aug 21 18:50:45 SilenceServices sshd[12280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.68.224 |
2019-08-22 04:29:19 |
| 117.140.146.103 | attack | [portscan] Port scan |
2019-08-22 04:49:15 |
| 87.101.240.10 | attackbots | Automatic report - Banned IP Access |
2019-08-22 04:28:49 |
| 167.99.125.57 | attackspam | k+ssh-bruteforce |
2019-08-22 04:58:57 |
| 194.44.93.225 | attackspam | " " |
2019-08-22 04:45:43 |
| 68.183.37.128 | attackbots | Aug 21 14:14:29 vps65 sshd\[13721\]: Invalid user technology from 68.183.37.128 port 35428 Aug 21 14:14:29 vps65 sshd\[13721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.37.128 ... |
2019-08-22 05:06:19 |
| 174.138.40.132 | attack | vps1:sshd-InvalidUser |
2019-08-22 04:27:51 |
| 192.241.220.227 | attackspambots | WordPress wp-login brute force :: 192.241.220.227 0.200 BYPASS [22/Aug/2019:00:53:18 1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-08-22 04:58:04 |
| 201.216.193.65 | attackspambots | Aug 21 20:41:23 XXX sshd[19178]: Invalid user hunt from 201.216.193.65 port 49596 |
2019-08-22 05:11:28 |
| 122.188.209.210 | attackbots | Aug 21 12:29:27 plesk sshd[19891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.188.209.210 user=sync Aug 21 12:29:29 plesk sshd[19891]: Failed password for sync from 122.188.209.210 port 53770 ssh2 Aug 21 12:29:29 plesk sshd[19891]: Received disconnect from 122.188.209.210: 11: Bye Bye [preauth] Aug 21 12:37:20 plesk sshd[20164]: Invalid user aj from 122.188.209.210 Aug 21 12:37:20 plesk sshd[20164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.188.209.210 Aug 21 12:37:22 plesk sshd[20164]: Failed password for invalid user aj from 122.188.209.210 port 57423 ssh2 Aug 21 12:37:24 plesk sshd[20164]: Received disconnect from 122.188.209.210: 11: Bye Bye [preauth] Aug 21 12:41:17 plesk sshd[20298]: Invalid user unknown from 122.188.209.210 Aug 21 12:41:17 plesk sshd[20298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.188.209.210 Au........ ------------------------------- |
2019-08-22 04:56:15 |
| 144.21.105.112 | attack | Fail2Ban Ban Triggered |
2019-08-22 04:41:56 |