City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.219.111.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41065
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;34.219.111.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 14:00:25 CST 2025
;; MSG SIZE rcvd: 107
142.111.219.34.in-addr.arpa domain name pointer ec2-34-219-111-142.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.111.219.34.in-addr.arpa name = ec2-34-219-111-142.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
203.129.253.78 | attackspam | Dec 4 10:46:45 andromeda sshd\[14566\]: Invalid user Zxcv from 203.129.253.78 port 41746 Dec 4 10:46:45 andromeda sshd\[14566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.253.78 Dec 4 10:46:47 andromeda sshd\[14566\]: Failed password for invalid user Zxcv from 203.129.253.78 port 41746 ssh2 |
2019-12-04 17:58:53 |
186.149.46.4 | attackspam | Dec 4 11:08:40 vps691689 sshd[13971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.149.46.4 Dec 4 11:08:42 vps691689 sshd[13971]: Failed password for invalid user roxana from 186.149.46.4 port 23484 ssh2 ... |
2019-12-04 18:27:58 |
111.198.54.177 | attack | Fail2Ban - SSH Bruteforce Attempt |
2019-12-04 18:23:23 |
124.29.252.176 | attack | FTP brute force ... |
2019-12-04 18:03:02 |
206.189.135.192 | attackspam | $f2bV_matches |
2019-12-04 18:26:54 |
221.154.166.165 | attackspam | Dec 2 07:06:10 sanyalnet-cloud-vps3 sshd[20385]: Connection from 221.154.166.165 port 38426 on 45.62.248.66 port 22 Dec 2 07:06:10 sanyalnet-cloud-vps3 sshd[20385]: Did not receive identification string from 221.154.166.165 Dec 2 07:06:30 sanyalnet-cloud-vps3 sshd[20386]: Connection from 221.154.166.165 port 40888 on 45.62.248.66 port 22 Dec 2 07:06:32 sanyalnet-cloud-vps3 sshd[20386]: User r.r from 221.154.166.165 not allowed because not listed in AllowUsers Dec 2 07:06:32 sanyalnet-cloud-vps3 sshd[20386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.154.166.165 user=r.r Dec 2 07:06:34 sanyalnet-cloud-vps3 sshd[20386]: Failed password for invalid user r.r from 221.154.166.165 port 40888 ssh2 Dec 2 07:06:34 sanyalnet-cloud-vps3 sshd[20386]: Received disconnect from 221.154.166.165: 11: Bye Bye [preauth] Dec 2 07:06:48 sanyalnet-cloud-vps3 sshd[20388]: Connection from 221.154.166.165 port 42994 on 45.62.248.66 port ........ ------------------------------- |
2019-12-04 18:33:13 |
45.35.14.209 | attackspambots | Host Scan |
2019-12-04 18:05:37 |
49.232.35.211 | attackspam | Dec 4 10:13:51 MK-Soft-VM6 sshd[30389]: Failed password for sshd from 49.232.35.211 port 42158 ssh2 ... |
2019-12-04 18:19:33 |
138.68.72.7 | attackspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.72.7 user=root Failed password for root from 138.68.72.7 port 54358 ssh2 Invalid user fursdon from 138.68.72.7 port 37468 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.72.7 Failed password for invalid user fursdon from 138.68.72.7 port 37468 ssh2 |
2019-12-04 18:04:23 |
106.12.33.174 | attack | 2019-12-04T09:44:04.878877abusebot-4.cloudsearch.cf sshd\[2272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.174 user=dbus |
2019-12-04 18:08:01 |
220.130.10.13 | attack | Dec 4 10:49:52 vps666546 sshd\[31811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13 user=root Dec 4 10:49:54 vps666546 sshd\[31811\]: Failed password for root from 220.130.10.13 port 36141 ssh2 Dec 4 10:57:04 vps666546 sshd\[32048\]: Invalid user dacenko from 220.130.10.13 port 46464 Dec 4 10:57:04 vps666546 sshd\[32048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13 Dec 4 10:57:07 vps666546 sshd\[32048\]: Failed password for invalid user dacenko from 220.130.10.13 port 46464 ssh2 ... |
2019-12-04 18:00:46 |
111.231.121.62 | attackbotsspam | Dec 3 14:29:58 server sshd\[9425\]: Failed password for root from 111.231.121.62 port 51304 ssh2 Dec 4 02:22:34 server sshd\[14568\]: Invalid user cc from 111.231.121.62 Dec 4 02:22:34 server sshd\[14568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.121.62 Dec 4 02:22:36 server sshd\[14568\]: Failed password for invalid user cc from 111.231.121.62 port 43980 ssh2 Dec 4 12:46:20 server sshd\[21729\]: Invalid user bartolomeu from 111.231.121.62 Dec 4 12:46:20 server sshd\[21729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.121.62 ... |
2019-12-04 18:00:02 |
84.2.226.70 | attackbotsspam | Dec 3 23:57:17 kapalua sshd\[19291\]: Invalid user khurshee from 84.2.226.70 Dec 3 23:57:17 kapalua sshd\[19291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ktv5402e246.fixip.t-online.hu Dec 3 23:57:20 kapalua sshd\[19291\]: Failed password for invalid user khurshee from 84.2.226.70 port 59830 ssh2 Dec 4 00:03:43 kapalua sshd\[19942\]: Invalid user sadness from 84.2.226.70 Dec 4 00:03:43 kapalua sshd\[19942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ktv5402e246.fixip.t-online.hu |
2019-12-04 18:26:06 |
213.241.46.78 | attack | Dec 3 23:38:16 php1 sshd\[29943\]: Invalid user server from 213.241.46.78 Dec 3 23:38:16 php1 sshd\[29943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=kominywulkan.pl Dec 3 23:38:18 php1 sshd\[29943\]: Failed password for invalid user server from 213.241.46.78 port 46850 ssh2 Dec 3 23:46:17 php1 sshd\[31243\]: Invalid user westonw from 213.241.46.78 Dec 3 23:46:17 php1 sshd\[31243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=kominywulkan.pl |
2019-12-04 18:01:59 |
106.75.244.62 | attackspam | Dec 3 23:37:20 web9 sshd\[6982\]: Invalid user troppus from 106.75.244.62 Dec 3 23:37:20 web9 sshd\[6982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.244.62 Dec 3 23:37:22 web9 sshd\[6982\]: Failed password for invalid user troppus from 106.75.244.62 port 51192 ssh2 Dec 3 23:44:12 web9 sshd\[7957\]: Invalid user bertrams from 106.75.244.62 Dec 3 23:44:12 web9 sshd\[7957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.244.62 |
2019-12-04 18:10:30 |