City: unknown
Region: unknown
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.134.4.35
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10018
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;44.134.4.35. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 14:15:17 CST 2025
;; MSG SIZE rcvd: 104
Host 35.4.134.44.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 35.4.134.44.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
222.186.42.7 | attackspam | Aug 14 23:19:31 scw-6657dc sshd[4516]: Failed password for root from 222.186.42.7 port 14582 ssh2 Aug 14 23:19:31 scw-6657dc sshd[4516]: Failed password for root from 222.186.42.7 port 14582 ssh2 Aug 14 23:19:33 scw-6657dc sshd[4516]: Failed password for root from 222.186.42.7 port 14582 ssh2 ... |
2020-08-15 07:20:04 |
184.168.193.116 | attack | Automatic report - XMLRPC Attack |
2020-08-15 07:18:34 |
103.20.188.18 | attackspambots | Aug 15 00:19:51 [host] sshd[3813]: Invalid user 12 Aug 15 00:19:51 [host] sshd[3813]: pam_unix(sshd:a Aug 15 00:19:54 [host] sshd[3813]: Failed password |
2020-08-15 06:51:39 |
185.214.164.110 | attack | 2020-08-14T13:42:12.212536suse-nuc sshd[7117]: Invalid user admin from 185.214.164.110 port 36832 ... |
2020-08-15 06:59:13 |
34.89.141.164 | attackbots | Aug 14 22:34:42 efa1 sshd[17324]: Invalid user csevfnzg from 34.89.141.164 Aug 14 22:34:42 efa1 sshd[17324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.141.89.34.bc.googleusercontent.com Aug 14 22:34:43 efa1 sshd[17330]: Invalid user ntkgolpr from 34.89.141.164 Aug 14 22:34:43 efa1 sshd[17330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.141.89.34.bc.googleusercontent.com Aug 14 22:34:44 efa1 sshd[17324]: Failed password for invalid user csevfnzg from 34.89.141.164 port 49875 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=34.89.141.164 |
2020-08-15 06:58:51 |
196.52.43.95 | attackspambots | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-08-15 07:02:00 |
217.182.68.147 | attackspambots | Aug 15 01:10:17 piServer sshd[10075]: Failed password for root from 217.182.68.147 port 45347 ssh2 Aug 15 01:13:12 piServer sshd[10292]: Failed password for root from 217.182.68.147 port 41059 ssh2 ... |
2020-08-15 07:26:58 |
2.57.122.190 | attackbots |
|
2020-08-15 07:16:03 |
122.144.196.122 | attack | Aug 14 23:26:55 PorscheCustomer sshd[30320]: Failed password for root from 122.144.196.122 port 58187 ssh2 Aug 14 23:31:13 PorscheCustomer sshd[30470]: Failed password for root from 122.144.196.122 port 60072 ssh2 ... |
2020-08-15 07:13:13 |
92.63.197.66 | attackspam | Aug 15 00:51:01 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=92.63.197.66 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=12987 PROTO=TCP SPT=49421 DPT=35256 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 15 00:51:45 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=92.63.197.66 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=41795 PROTO=TCP SPT=49421 DPT=32718 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 15 00:52:24 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=92.63.197.66 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=55425 PROTO=TCP SPT=49421 DPT=35810 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 15 00:56:56 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=92.63.197.66 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=39894 PROTO=TCP SPT=49421 DPT=32535 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 15 00:57:13 *hidden* ker ... |
2020-08-15 07:15:42 |
151.231.109.126 | attackbots | [14/Aug/2020 x@x [14/Aug/2020 x@x [14/Aug/2020 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=151.231.109.126 |
2020-08-15 07:06:45 |
198.46.214.46 | attack | Contact form spam |
2020-08-15 06:51:15 |
173.208.200.154 | attackbotsspam | [N10.H1.VM1] Port Scanner Detected Blocked by UFW |
2020-08-15 07:24:37 |
49.234.196.251 | attackspambots | SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2020-08-15 07:06:01 |
68.116.41.6 | attackspambots | Aug 14 23:59:36 rocket sshd[7442]: Failed password for root from 68.116.41.6 port 49322 ssh2 Aug 15 00:03:39 rocket sshd[7999]: Failed password for root from 68.116.41.6 port 59468 ssh2 ... |
2020-08-15 07:12:12 |