City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.137.134.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1777
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;38.137.134.246. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 15:27:36 CST 2025
;; MSG SIZE rcvd: 107
Host 246.134.137.38.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 246.134.137.38.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 49.235.81.23 | attackspambots | Apr 29 14:55:09 mout sshd[30880]: Invalid user shastry from 49.235.81.23 port 44606 |
2020-04-29 21:55:47 |
| 187.32.140.225 | attack | Unauthorized connection attempt from IP address 187.32.140.225 on Port 445(SMB) |
2020-04-29 22:17:46 |
| 82.117.163.210 | attackspam | 2020-04-29T15:02:56.990515sd-86998 sshd[6923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns2.nts.su user=root 2020-04-29T15:02:58.561467sd-86998 sshd[6923]: Failed password for root from 82.117.163.210 port 44601 ssh2 2020-04-29T15:07:50.567176sd-86998 sshd[7294]: Invalid user gerald from 82.117.163.210 port 50679 2020-04-29T15:07:50.569570sd-86998 sshd[7294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns2.nts.su 2020-04-29T15:07:50.567176sd-86998 sshd[7294]: Invalid user gerald from 82.117.163.210 port 50679 2020-04-29T15:07:53.168950sd-86998 sshd[7294]: Failed password for invalid user gerald from 82.117.163.210 port 50679 ssh2 ... |
2020-04-29 21:51:28 |
| 125.127.25.215 | attack | Unauthorized connection attempt from IP address 125.127.25.215 on Port 445(SMB) |
2020-04-29 22:06:44 |
| 51.38.230.10 | attackbots | Apr 29 15:31:06 OPSO sshd\[22494\]: Invalid user zjz from 51.38.230.10 port 40906 Apr 29 15:31:06 OPSO sshd\[22494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.230.10 Apr 29 15:31:09 OPSO sshd\[22494\]: Failed password for invalid user zjz from 51.38.230.10 port 40906 ssh2 Apr 29 15:35:02 OPSO sshd\[23590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.230.10 user=root Apr 29 15:35:05 OPSO sshd\[23590\]: Failed password for root from 51.38.230.10 port 52578 ssh2 |
2020-04-29 21:47:52 |
| 134.122.73.4 | attackspambots | Lines containing failures of 134.122.73.4 Apr 29 07:40:38 box sshd[12990]: Did not receive identification string from 134.122.73.4 port 44256 Apr 29 07:41:56 box sshd[12991]: Did not receive identification string from 134.122.73.4 port 46478 Apr 29 07:42:42 box sshd[12994]: Invalid user ftpuser from 134.122.73.4 port 33056 Apr 29 07:42:42 box sshd[12994]: Received disconnect from 134.122.73.4 port 33056:11: Normal Shutdown, Thank you for playing [preauth] Apr 29 07:42:42 box sshd[12994]: Disconnected from invalid user ftpuser 134.122.73.4 port 33056 [preauth] Apr 29 07:43:25 box sshd[13007]: Invalid user ghostname from 134.122.73.4 port 47626 Apr 29 07:43:25 box sshd[13007]: Received disconnect from 134.122.73.4 port 47626:11: Normal Shutdown, Thank you for playing [preauth] Apr 29 07:43:25 box sshd[13007]: Disconnected from invalid user ghostname 134.122.73.4 port 47626 [preauth] Apr 29 07:44:09 box sshd[13010]: Invalid user oracle from 134.122.73.4 port 33966 Apr 29 07........ ------------------------------ |
2020-04-29 22:00:38 |
| 101.78.149.142 | attackbotsspam | k+ssh-bruteforce |
2020-04-29 22:15:20 |
| 128.199.91.233 | attackspambots | Apr 29 16:03:20 plex sshd[30758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.91.233 user=root Apr 29 16:03:22 plex sshd[30758]: Failed password for root from 128.199.91.233 port 47140 ssh2 |
2020-04-29 22:04:05 |
| 222.186.173.215 | attack | Apr 29 15:22:48 * sshd[3087]: Failed password for root from 222.186.173.215 port 54864 ssh2 Apr 29 15:23:03 * sshd[3087]: error: maximum authentication attempts exceeded for root from 222.186.173.215 port 54864 ssh2 [preauth] |
2020-04-29 21:57:41 |
| 128.201.51.241 | attackspambots | Unauthorized connection attempt from IP address 128.201.51.241 on Port 445(SMB) |
2020-04-29 22:08:43 |
| 170.79.87.132 | attackbotsspam | Lines containing failures of 170.79.87.132 Apr 29 13:43:40 shared10 sshd[1309]: Invalid user jenkins from 170.79.87.132 port 57488 Apr 29 13:43:40 shared10 sshd[1309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.79.87.132 Apr 29 13:43:41 shared10 sshd[1309]: Failed password for invalid user jenkins from 170.79.87.132 port 57488 ssh2 Apr 29 13:43:42 shared10 sshd[1309]: Received disconnect from 170.79.87.132 port 57488:11: Bye Bye [preauth] Apr 29 13:43:42 shared10 sshd[1309]: Disconnected from invalid user jenkins 170.79.87.132 port 57488 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=170.79.87.132 |
2020-04-29 21:54:52 |
| 34.246.31.200 | attackspambots | Abusive spam From: Teaparty 247 |
2020-04-29 21:45:49 |
| 1.54.227.228 | attackbotsspam | Unauthorized connection attempt from IP address 1.54.227.228 on Port 445(SMB) |
2020-04-29 21:48:14 |
| 80.82.77.189 | attackbotsspam | slow and persistent scanner |
2020-04-29 22:12:21 |
| 183.82.112.65 | attack | Unauthorized connection attempt from IP address 183.82.112.65 on Port 445(SMB) |
2020-04-29 21:49:21 |