City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.131.138.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38496
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.131.138.46. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400
;; Query time: 170 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:27:56 CST 2025
;; MSG SIZE rcvd: 106
46.138.131.64.in-addr.arpa domain name pointer h46.138.131.64.static.ip.windstream.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
46.138.131.64.in-addr.arpa name = h46.138.131.64.static.ip.windstream.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 134.17.94.69 | attack | Jun 1 19:11:55 our-server-hostname sshd[17594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.69 user=r.r Jun 1 19:11:58 our-server-hostname sshd[17594]: Failed password for r.r from 134.17.94.69 port 4938 ssh2 Jun 1 19:28:11 our-server-hostname sshd[20978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.69 user=r.r Jun 1 19:28:12 our-server-hostname sshd[20978]: Failed password for r.r from 134.17.94.69 port 4939 ssh2 Jun 1 19:31:31 our-server-hostname sshd[21729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.69 user=r.r Jun 1 19:31:33 our-server-hostname sshd[21729]: Failed password for r.r from 134.17.94.69 port 4940 ssh2 Jun 1 19:34:56 our-server-hostname sshd[22329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.94.69 user=r.r Jun 1 19:34:58 our-server........ ------------------------------- |
2020-06-04 22:57:50 |
| 103.81.84.10 | attackbots | Jun 4 14:57:26 srv-ubuntu-dev3 sshd[26186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.81.84.10 user=root Jun 4 14:57:28 srv-ubuntu-dev3 sshd[26186]: Failed password for root from 103.81.84.10 port 51676 ssh2 Jun 4 14:59:19 srv-ubuntu-dev3 sshd[26477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.81.84.10 user=root Jun 4 14:59:21 srv-ubuntu-dev3 sshd[26477]: Failed password for root from 103.81.84.10 port 50858 ssh2 Jun 4 15:01:18 srv-ubuntu-dev3 sshd[26903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.81.84.10 user=root Jun 4 15:01:20 srv-ubuntu-dev3 sshd[26903]: Failed password for root from 103.81.84.10 port 50078 ssh2 Jun 4 15:03:17 srv-ubuntu-dev3 sshd[27195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.81.84.10 user=root Jun 4 15:03:20 srv-ubuntu-dev3 sshd[27195]: Failed password ... |
2020-06-04 22:40:44 |
| 96.77.231.29 | attackspambots | Triggered by Fail2Ban at Ares web server |
2020-06-04 23:22:45 |
| 1.2.185.57 | attackbotsspam | 1591272406 - 06/04/2020 14:06:46 Host: 1.2.185.57/1.2.185.57 Port: 445 TCP Blocked |
2020-06-04 23:15:48 |
| 54.37.153.80 | attack | Jun 4 15:29:55 vmd17057 sshd[4190]: Failed password for root from 54.37.153.80 port 38392 ssh2 ... |
2020-06-04 23:11:59 |
| 152.32.109.98 | attackbots | php WP PHPmyadamin ABUSE blocked for 12h |
2020-06-04 23:01:07 |
| 91.219.253.27 | attackbotsspam | Automatic report - XMLRPC Attack |
2020-06-04 23:07:16 |
| 218.92.0.184 | attack | Jun 4 17:13:15 vserver sshd\[31862\]: Failed password for root from 218.92.0.184 port 42463 ssh2Jun 4 17:13:18 vserver sshd\[31862\]: Failed password for root from 218.92.0.184 port 42463 ssh2Jun 4 17:13:22 vserver sshd\[31862\]: Failed password for root from 218.92.0.184 port 42463 ssh2Jun 4 17:13:25 vserver sshd\[31862\]: Failed password for root from 218.92.0.184 port 42463 ssh2 ... |
2020-06-04 23:14:05 |
| 159.65.147.1 | attack | "fail2ban match" |
2020-06-04 22:48:56 |
| 203.75.29.110 | attack | Lines containing failures of 203.75.29.110 Jun 3 22:39:32 siirappi sshd[11334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.75.29.110 user=r.r Jun 3 22:39:34 siirappi sshd[11334]: Failed password for r.r from 203.75.29.110 port 44828 ssh2 Jun 3 22:39:35 siirappi sshd[11334]: Received disconnect from 203.75.29.110 port 44828:11: Bye Bye [preauth] Jun 3 22:39:35 siirappi sshd[11334]: Disconnected from authenticating user r.r 203.75.29.110 port 44828 [preauth] Jun 3 22:56:02 siirappi sshd[11415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.75.29.110 user=r.r Jun 3 22:56:05 siirappi sshd[11415]: Failed password for r.r from 203.75.29.110 port 44612 ssh2 Jun 3 22:56:06 siirappi sshd[11415]: Received disconnect from 203.75.29.110 port 44612:11: Bye Bye [preauth] Jun 3 22:56:06 siirappi sshd[11415]: Disconnected from authenticating user r.r 203.75.29.110 port 44612 [preauth........ ------------------------------ |
2020-06-04 23:09:53 |
| 140.143.56.61 | attack | 2020-06-04T15:18:43.880111vps773228.ovh.net sshd[24585]: Failed password for root from 140.143.56.61 port 51890 ssh2 2020-06-04T15:23:53.528781vps773228.ovh.net sshd[24667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.56.61 user=root 2020-06-04T15:23:54.743009vps773228.ovh.net sshd[24667]: Failed password for root from 140.143.56.61 port 50220 ssh2 2020-06-04T15:29:04.073400vps773228.ovh.net sshd[24764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.56.61 user=root 2020-06-04T15:29:06.316557vps773228.ovh.net sshd[24764]: Failed password for root from 140.143.56.61 port 48556 ssh2 ... |
2020-06-04 23:06:42 |
| 54.39.19.211 | attack | 2020-06-04 07:39:59.921337-0500 localhost sshd[9043]: Failed password for sshd from 54.39.19.211 port 40192 ssh2 |
2020-06-04 23:03:25 |
| 121.185.21.134 | attackbotsspam | Port probing on unauthorized port 23 |
2020-06-04 22:50:55 |
| 58.211.144.220 | attackspambots |
|
2020-06-04 23:04:37 |
| 210.212.233.34 | attack | Jun 4 14:19:26 abendstille sshd\[10306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.233.34 user=root Jun 4 14:19:28 abendstille sshd\[10306\]: Failed password for root from 210.212.233.34 port 35244 ssh2 Jun 4 14:23:27 abendstille sshd\[14451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.233.34 user=root Jun 4 14:23:29 abendstille sshd\[14451\]: Failed password for root from 210.212.233.34 port 56248 ssh2 Jun 4 14:27:24 abendstille sshd\[18571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.233.34 user=root ... |
2020-06-04 22:49:54 |