City: unknown
Region: unknown
Country: Russian Federation (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.3.134.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63877
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;5.3.134.229. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 09:04:02 CST 2025
;; MSG SIZE rcvd: 104
229.134.3.5.in-addr.arpa domain name pointer 5x3x134x229.dynamic.oren.ertelecom.ru.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
229.134.3.5.in-addr.arpa name = 5x3x134x229.dynamic.oren.ertelecom.ru.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 91.67.43.182 | attackspambots | Nov 9 13:29:58 XXX sshd[58109]: Invalid user ofsaa from 91.67.43.182 port 59894 |
2019-11-09 21:06:14 |
| 139.199.183.185 | attackspambots | Automatic report - Banned IP Access |
2019-11-09 21:31:38 |
| 98.124.25.245 | attack | Unauthorized IMAP connection attempt |
2019-11-09 21:11:52 |
| 145.239.95.83 | attackspambots | $f2bV_matches |
2019-11-09 21:09:28 |
| 124.104.5.110 | attackbotsspam | 124.104.5.110 was recorded 5 times by 1 hosts attempting to connect to the following ports: 15941. Incident counter (4h, 24h, all-time): 5, 5, 5 |
2019-11-09 21:20:16 |
| 62.234.109.203 | attackspam | detected by Fail2Ban |
2019-11-09 21:04:53 |
| 159.203.139.128 | attack | Nov 9 13:04:33 localhost sshd\[18865\]: Invalid user lidl from 159.203.139.128 port 52154 Nov 9 13:04:33 localhost sshd\[18865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.139.128 Nov 9 13:04:35 localhost sshd\[18865\]: Failed password for invalid user lidl from 159.203.139.128 port 52154 ssh2 ... |
2019-11-09 21:27:41 |
| 83.175.217.26 | attackspambots | Nov 9 06:38:16 web1 postfix/smtpd[4666]: warning: unknown[83.175.217.26]: SASL LOGIN authentication failed: authentication failure ... |
2019-11-09 21:15:18 |
| 95.27.163.146 | attackbotsspam | Brute force attempt |
2019-11-09 21:25:11 |
| 190.195.131.249 | attack | Nov 9 14:07:55 MK-Soft-VM3 sshd[19250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.195.131.249 Nov 9 14:07:58 MK-Soft-VM3 sshd[19250]: Failed password for invalid user gp from 190.195.131.249 port 32969 ssh2 ... |
2019-11-09 21:33:51 |
| 139.59.169.84 | attackbots | Automatic report - XMLRPC Attack |
2019-11-09 21:41:23 |
| 222.186.175.148 | attackspam | Nov 9 14:17:55 mail sshd[15755]: Failed password for root from 222.186.175.148 port 42658 ssh2 Nov 9 14:18:02 mail sshd[15755]: Failed password for root from 222.186.175.148 port 42658 ssh2 Nov 9 14:18:08 mail sshd[15755]: Failed password for root from 222.186.175.148 port 42658 ssh2 Nov 9 14:18:13 mail sshd[15755]: Failed password for root from 222.186.175.148 port 42658 ssh2 |
2019-11-09 21:25:37 |
| 35.201.243.170 | attackbotsspam | Repeated brute force against a port |
2019-11-09 21:28:30 |
| 111.231.89.162 | attackbotsspam | $f2bV_matches |
2019-11-09 21:14:43 |
| 160.153.156.138 | attackspambots | Automatic report - XMLRPC Attack |
2019-11-09 21:26:51 |