City: unknown
Region: unknown
Country: Russia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.143.201.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26703
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.143.201.34. IN A
;; AUTHORITY SECTION:
. 300 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024070300 1800 900 604800 86400
;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jul 03 16:10:03 CST 2024
;; MSG SIZE rcvd: 106
34.201.143.45.in-addr.arpa domain name pointer cl44.ntup.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
34.201.143.45.in-addr.arpa name = cl44.ntup.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 103.212.64.98 | attack | Oct 14 06:45:42 www1 sshd\[5402\]: Invalid user Wireless@2017 from 103.212.64.98Oct 14 06:45:43 www1 sshd\[5402\]: Failed password for invalid user Wireless@2017 from 103.212.64.98 port 44050 ssh2Oct 14 06:50:41 www1 sshd\[5983\]: Invalid user @34WwerSdfXcv from 103.212.64.98Oct 14 06:50:43 www1 sshd\[5983\]: Failed password for invalid user @34WwerSdfXcv from 103.212.64.98 port 35447 ssh2Oct 14 06:55:37 www1 sshd\[6521\]: Invalid user Salut1@3 from 103.212.64.98Oct 14 06:55:39 www1 sshd\[6521\]: Failed password for invalid user Salut1@3 from 103.212.64.98 port 55084 ssh2 ... |
2019-10-14 14:01:51 |
| 125.214.50.109 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 14-10-2019 04:55:19. |
2019-10-14 14:15:33 |
| 92.222.34.211 | attackbotsspam | Oct 14 01:51:53 xtremcommunity sshd\[500797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.34.211 user=root Oct 14 01:51:55 xtremcommunity sshd\[500797\]: Failed password for root from 92.222.34.211 port 60292 ssh2 Oct 14 01:56:02 xtremcommunity sshd\[500875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.34.211 user=root Oct 14 01:56:04 xtremcommunity sshd\[500875\]: Failed password for root from 92.222.34.211 port 43438 ssh2 Oct 14 02:00:22 xtremcommunity sshd\[500960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.34.211 user=root ... |
2019-10-14 14:01:38 |
| 80.211.169.105 | attackbots | Oct 14 05:52:12 game-panel sshd[1653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.169.105 Oct 14 05:52:14 game-panel sshd[1653]: Failed password for invalid user Tan@2017 from 80.211.169.105 port 37338 ssh2 Oct 14 05:56:46 game-panel sshd[1767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.169.105 |
2019-10-14 14:06:50 |
| 61.183.178.194 | attackspam | Oct 13 19:26:14 sachi sshd\[23265\]: Invalid user Passw0rt1@3 from 61.183.178.194 Oct 13 19:26:14 sachi sshd\[23265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.183.178.194 Oct 13 19:26:16 sachi sshd\[23265\]: Failed password for invalid user Passw0rt1@3 from 61.183.178.194 port 3016 ssh2 Oct 13 19:31:53 sachi sshd\[23732\]: Invalid user Sigma from 61.183.178.194 Oct 13 19:31:53 sachi sshd\[23732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.183.178.194 |
2019-10-14 14:10:23 |
| 128.199.137.252 | attack | Oct 14 03:38:56 marvibiene sshd[15275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.137.252 user=root Oct 14 03:38:58 marvibiene sshd[15275]: Failed password for root from 128.199.137.252 port 52870 ssh2 Oct 14 03:55:16 marvibiene sshd[15474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.137.252 user=root Oct 14 03:55:18 marvibiene sshd[15474]: Failed password for root from 128.199.137.252 port 39452 ssh2 ... |
2019-10-14 14:15:10 |
| 222.186.31.145 | attackbotsspam | Oct 14 06:58:23 dcd-gentoo sshd[3233]: User root from 222.186.31.145 not allowed because none of user's groups are listed in AllowGroups Oct 14 06:58:26 dcd-gentoo sshd[3233]: error: PAM: Authentication failure for illegal user root from 222.186.31.145 Oct 14 06:58:23 dcd-gentoo sshd[3233]: User root from 222.186.31.145 not allowed because none of user's groups are listed in AllowGroups Oct 14 06:58:26 dcd-gentoo sshd[3233]: error: PAM: Authentication failure for illegal user root from 222.186.31.145 Oct 14 06:58:23 dcd-gentoo sshd[3233]: User root from 222.186.31.145 not allowed because none of user's groups are listed in AllowGroups Oct 14 06:58:26 dcd-gentoo sshd[3233]: error: PAM: Authentication failure for illegal user root from 222.186.31.145 Oct 14 06:58:26 dcd-gentoo sshd[3233]: Failed keyboard-interactive/pam for invalid user root from 222.186.31.145 port 63270 ssh2 ... |
2019-10-14 14:11:51 |
| 93.226.100.68 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/93.226.100.68/ DE - 1H : (70) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : DE NAME ASN : ASN3320 IP : 93.226.100.68 CIDR : 93.192.0.0/10 PREFIX COUNT : 481 UNIQUE IP COUNT : 29022208 WYKRYTE ATAKI Z ASN3320 : 1H - 1 3H - 3 6H - 6 12H - 8 24H - 19 DateTime : 2019-10-14 05:55:24 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-10-14 14:07:08 |
| 190.7.128.74 | attackbots | Oct 14 07:44:13 vps01 sshd[15178]: Failed password for root from 190.7.128.74 port 28770 ssh2 |
2019-10-14 14:08:14 |
| 122.115.230.183 | attackbotsspam | 2019-10-14T05:40:35.090675abusebot-3.cloudsearch.cf sshd\[17875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.115.230.183 user=root |
2019-10-14 14:04:44 |
| 120.29.77.161 | attackbotsspam | Unauthorized connection attempt from IP address 120.29.77.161 on Port 445(SMB) |
2019-10-14 14:15:59 |
| 115.159.235.17 | attack | Oct 14 07:56:28 meumeu sshd[28800]: Failed password for root from 115.159.235.17 port 50488 ssh2 Oct 14 08:01:00 meumeu sshd[29626]: Failed password for root from 115.159.235.17 port 60176 ssh2 ... |
2019-10-14 14:24:47 |
| 129.146.168.196 | attackspambots | Oct 14 02:54:44 firewall sshd[10098]: Failed password for root from 129.146.168.196 port 47356 ssh2 Oct 14 02:58:33 firewall sshd[10206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.168.196 user=root Oct 14 02:58:35 firewall sshd[10206]: Failed password for root from 129.146.168.196 port 38652 ssh2 ... |
2019-10-14 14:31:00 |
| 190.123.157.57 | attack | Automatic report - Port Scan Attack |
2019-10-14 14:26:04 |
| 103.109.52.50 | attackbotsspam | *Port Scan* detected from 103.109.52.50 (BD/Bangladesh/-). 4 hits in the last 70 seconds |
2019-10-14 14:30:01 |