City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.194.19.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39278
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;34.194.19.120. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 03:35:20 CST 2025
;; MSG SIZE rcvd: 106
120.19.194.34.in-addr.arpa domain name pointer ec2-34-194-19-120.compute-1.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
120.19.194.34.in-addr.arpa name = ec2-34-194-19-120.compute-1.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 1.63.238.92 | attackbotsspam | Unauthorised access (Aug 11) SRC=1.63.238.92 LEN=40 TTL=46 ID=31798 TCP DPT=8080 WINDOW=30362 SYN |
2020-08-11 23:16:06 |
| 50.100.113.207 | attackspam | 2020-08-11T17:06:27.823043cyberdyne sshd[443760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.100.113.207 user=root 2020-08-11T17:06:29.841881cyberdyne sshd[443760]: Failed password for root from 50.100.113.207 port 60838 ssh2 2020-08-11T17:08:26.503500cyberdyne sshd[443800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.100.113.207 user=root 2020-08-11T17:08:29.192920cyberdyne sshd[443800]: Failed password for root from 50.100.113.207 port 34746 ssh2 ... |
2020-08-11 23:14:14 |
| 192.35.168.173 | attackbots | Port Scan/VNC login attempt ... |
2020-08-11 22:32:22 |
| 213.158.10.101 | attackspambots | Aug 11 16:41:08 ns37 sshd[17887]: Failed password for root from 213.158.10.101 port 60408 ssh2 Aug 11 16:41:08 ns37 sshd[17887]: Failed password for root from 213.158.10.101 port 60408 ssh2 |
2020-08-11 23:12:36 |
| 122.51.21.208 | attackspambots | Aug 11 13:51:56 server sshd[15318]: Failed password for root from 122.51.21.208 port 42806 ssh2 Aug 11 14:01:44 server sshd[30982]: Failed password for root from 122.51.21.208 port 38784 ssh2 Aug 11 14:11:31 server sshd[12517]: Failed password for root from 122.51.21.208 port 34762 ssh2 |
2020-08-11 22:58:08 |
| 61.188.18.141 | attackbotsspam | Aug 11 16:27:53 lnxmail61 sshd[20232]: Failed password for root from 61.188.18.141 port 34333 ssh2 Aug 11 16:27:53 lnxmail61 sshd[20232]: Failed password for root from 61.188.18.141 port 34333 ssh2 |
2020-08-11 22:37:15 |
| 179.124.34.8 | attack | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-11T14:05:08Z and 2020-08-11T14:13:42Z |
2020-08-11 23:11:51 |
| 49.233.212.154 | attackbotsspam | 2020-08-11T13:58:56.529878ns386461 sshd\[21218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.212.154 user=root 2020-08-11T13:58:58.650390ns386461 sshd\[21218\]: Failed password for root from 49.233.212.154 port 52662 ssh2 2020-08-11T14:06:40.978864ns386461 sshd\[28612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.212.154 user=root 2020-08-11T14:06:42.798194ns386461 sshd\[28612\]: Failed password for root from 49.233.212.154 port 42498 ssh2 2020-08-11T14:11:58.477212ns386461 sshd\[1005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.212.154 user=root ... |
2020-08-11 22:41:14 |
| 58.153.174.86 | attackbots | SSH brute force attempt |
2020-08-11 23:12:11 |
| 69.47.161.24 | attackspam | $f2bV_matches |
2020-08-11 23:06:00 |
| 85.185.42.99 | attack | 20/8/11@10:58:03: FAIL: Alarm-Network address from=85.185.42.99 ... |
2020-08-11 23:09:32 |
| 218.92.0.224 | attack | Aug 11 11:00:56 NPSTNNYC01T sshd[422]: Failed password for root from 218.92.0.224 port 13569 ssh2 Aug 11 11:01:10 NPSTNNYC01T sshd[422]: Failed password for root from 218.92.0.224 port 13569 ssh2 Aug 11 11:01:10 NPSTNNYC01T sshd[422]: error: maximum authentication attempts exceeded for root from 218.92.0.224 port 13569 ssh2 [preauth] ... |
2020-08-11 23:02:20 |
| 148.66.142.174 | attackspambots | Aug 11 15:42:57 b-vps wordpress(gpfans.cz)[30596]: Authentication attempt for unknown user buchtic from 148.66.142.174 ... |
2020-08-11 22:56:38 |
| 165.227.51.249 | attack | SSH invalid-user multiple login try |
2020-08-11 23:15:28 |
| 54.38.242.206 | attack | Fail2Ban |
2020-08-11 23:19:09 |