City: Garden City
Region: Kansas
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.103.34.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19798
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.103.34.104. IN A
;; AUTHORITY SECTION:
. 512 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020093002 1800 900 604800 86400
;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 01 09:12:28 CST 2020
;; MSG SIZE rcvd: 117
104.34.103.68.in-addr.arpa domain name pointer ip68-103-34-104.ks.ok.cox.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
104.34.103.68.in-addr.arpa name = ip68-103-34-104.ks.ok.cox.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
142.93.47.125 | attackspambots | detected by Fail2Ban |
2019-07-01 02:36:01 |
80.184.89.210 | attackspambots | firewall-block, port(s): 5555/tcp |
2019-07-01 02:15:25 |
106.12.19.196 | attackspambots | Jun 30 18:04:30 server sshd[32496]: Failed password for invalid user elk_user from 106.12.19.196 port 42686 ssh2 Jun 30 18:08:29 server sshd[33394]: Failed password for invalid user jordan from 106.12.19.196 port 46728 ssh2 Jun 30 18:10:45 server sshd[33957]: Failed password for invalid user artifactory from 106.12.19.196 port 35210 ssh2 |
2019-07-01 02:35:28 |
197.232.26.32 | attack | firewall-block, port(s): 8080/tcp |
2019-07-01 02:05:08 |
14.139.225.50 | attack | Wordpress XMLRPC attack |
2019-07-01 02:17:13 |
140.143.208.180 | attackbots | Jun 30 15:20:22 MK-Soft-Root1 sshd\[8052\]: Invalid user pick from 140.143.208.180 port 40768 Jun 30 15:20:22 MK-Soft-Root1 sshd\[8052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.208.180 Jun 30 15:20:24 MK-Soft-Root1 sshd\[8052\]: Failed password for invalid user pick from 140.143.208.180 port 40768 ssh2 ... |
2019-07-01 02:03:23 |
178.128.194.116 | attackspam | $f2bV_matches |
2019-07-01 02:12:38 |
170.0.60.70 | attack | 2019-06-30T16:18:59.6025101240 sshd\[2950\]: Invalid user wap from 170.0.60.70 port 47585 2019-06-30T16:18:59.6078681240 sshd\[2950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.0.60.70 2019-06-30T16:19:01.1801811240 sshd\[2950\]: Failed password for invalid user wap from 170.0.60.70 port 47585 ssh2 ... |
2019-07-01 02:39:25 |
184.105.139.70 | attack | port scan and connect, tcp 8080 (http-proxy) |
2019-07-01 02:08:05 |
221.131.68.210 | attackspam | Jun 30 09:20:44 debian sshd\[26127\]: Invalid user gentoo from 221.131.68.210 port 33146 Jun 30 09:20:44 debian sshd\[26127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.131.68.210 Jun 30 09:20:46 debian sshd\[26127\]: Failed password for invalid user gentoo from 221.131.68.210 port 33146 ssh2 ... |
2019-07-01 01:56:32 |
46.245.148.195 | attackbotsspam | Jun 30 12:56:54 xtremcommunity sshd\[16820\]: Invalid user rajesh from 46.245.148.195 port 51576 Jun 30 12:56:54 xtremcommunity sshd\[16820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.245.148.195 Jun 30 12:56:57 xtremcommunity sshd\[16820\]: Failed password for invalid user rajesh from 46.245.148.195 port 51576 ssh2 Jun 30 12:58:27 xtremcommunity sshd\[16834\]: Invalid user vnc from 46.245.148.195 port 39718 Jun 30 12:58:27 xtremcommunity sshd\[16834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.245.148.195 ... |
2019-07-01 02:29:36 |
188.143.91.142 | attackspambots | 2019-06-30T15:19:16.819598scmdmz1 sshd\[8259\]: Invalid user testen from 188.143.91.142 port 38858 2019-06-30T15:19:16.824637scmdmz1 sshd\[8259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188-143-91-142.pool.digikabel.hu 2019-06-30T15:19:18.512965scmdmz1 sshd\[8259\]: Failed password for invalid user testen from 188.143.91.142 port 38858 ssh2 ... |
2019-07-01 02:32:51 |
206.189.197.48 | attack | Jun 30 20:10:33 [host] sshd[11610]: Invalid user setup from 206.189.197.48 Jun 30 20:10:33 [host] sshd[11610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.197.48 Jun 30 20:10:34 [host] sshd[11610]: Failed password for invalid user setup from 206.189.197.48 port 45698 ssh2 |
2019-07-01 02:28:50 |
45.71.244.2 | attackspam | Jun 30 15:20:08 ubuntu-2gb-nbg1-dc3-1 sshd[5677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.71.244.2 Jun 30 15:20:10 ubuntu-2gb-nbg1-dc3-1 sshd[5677]: Failed password for invalid user mysql1 from 45.71.244.2 port 39754 ssh2 ... |
2019-07-01 02:11:34 |
197.3.7.157 | attack | 2019-06-30T19:38:53.835919ns1.unifynetsol.net sshd\[3502\]: Invalid user dspace from 197.3.7.157 port 36180 2019-06-30T20:28:54.981763ns1.unifynetsol.net sshd\[11306\]: Invalid user nexus from 197.3.7.157 port 53730 2019-06-30T21:18:58.446709ns1.unifynetsol.net sshd\[18835\]: Invalid user nexus from 197.3.7.157 port 43026 2019-06-30T22:09:02.367232ns1.unifynetsol.net sshd\[26435\]: Invalid user testuser from 197.3.7.157 port 60564 2019-06-30T22:59:30.611647ns1.unifynetsol.net sshd\[1569\]: Invalid user testuser from 197.3.7.157 port 49912 |
2019-07-01 02:26:52 |