City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.145.76.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34367
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;34.145.76.134. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 10:08:58 CST 2025
;; MSG SIZE rcvd: 106
134.76.145.34.in-addr.arpa domain name pointer 134.76.145.34.bc.googleusercontent.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
134.76.145.34.in-addr.arpa name = 134.76.145.34.bc.googleusercontent.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 201.190.155.103 | attack | Repeated hacking attempts |
2019-07-02 20:36:22 |
| 59.185.244.243 | attackbotsspam | Invalid user eurobos from 59.185.244.243 port 42047 |
2019-07-02 20:06:05 |
| 212.109.4.125 | attack | Jul 2 05:32:38 localhost sshd\[13136\]: Invalid user n from 212.109.4.125 port 60302 Jul 2 05:32:41 localhost sshd\[13136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.109.4.125 ... |
2019-07-02 20:04:14 |
| 117.50.46.36 | attackspam | SSH Bruteforce |
2019-07-02 20:36:43 |
| 118.185.32.18 | attack | Dec 25 10:41:09 motanud sshd\[13028\]: Invalid user data from 118.185.32.18 port 1953 Dec 25 10:41:09 motanud sshd\[13028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.185.32.18 Dec 25 10:41:11 motanud sshd\[13028\]: Failed password for invalid user data from 118.185.32.18 port 1953 ssh2 |
2019-07-02 20:10:14 |
| 189.217.16.127 | attack | 445/tcp [2019-07-02]1pkt |
2019-07-02 20:31:00 |
| 1.53.145.150 | attack | 23/tcp [2019-07-02]1pkt |
2019-07-02 20:19:57 |
| 118.172.129.186 | attack | Jan 3 05:53:49 motanud sshd\[10477\]: Invalid user sg from 118.172.129.186 port 42922 Jan 3 05:53:49 motanud sshd\[10477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.172.129.186 Jan 3 05:53:50 motanud sshd\[10477\]: Failed password for invalid user sg from 118.172.129.186 port 42922 ssh2 |
2019-07-02 20:13:41 |
| 186.250.77.75 | attackbotsspam | $f2bV_matches |
2019-07-02 20:09:01 |
| 112.85.42.87 | attackspambots | Jul 2 14:01:08 amit sshd\[7062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87 user=root Jul 2 14:01:10 amit sshd\[7062\]: Failed password for root from 112.85.42.87 port 15503 ssh2 Jul 2 14:06:11 amit sshd\[1212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87 user=root ... |
2019-07-02 20:21:06 |
| 118.163.61.104 | attack | Jan 24 02:18:14 motanud sshd\[22554\]: Invalid user testftp from 118.163.61.104 port 33280 Jan 24 02:18:14 motanud sshd\[22554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.61.104 Jan 24 02:18:16 motanud sshd\[22554\]: Failed password for invalid user testftp from 118.163.61.104 port 33280 ssh2 |
2019-07-02 20:16:12 |
| 201.190.33.75 | attack | 23/tcp [2019-07-02]1pkt |
2019-07-02 20:07:56 |
| 74.63.232.2 | attackspam | SSH Bruteforce |
2019-07-02 20:19:03 |
| 144.217.40.3 | attackspambots | Feb 24 00:01:45 motanud sshd\[2937\]: Invalid user ubuntu from 144.217.40.3 port 57488 Feb 24 00:01:45 motanud sshd\[2937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.40.3 Feb 24 00:01:47 motanud sshd\[2937\]: Failed password for invalid user ubuntu from 144.217.40.3 port 57488 ssh2 |
2019-07-02 20:17:32 |
| 37.49.230.198 | attack | Attempts against SMTP/SSMTP |
2019-07-02 20:08:34 |