City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.122.70.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62862
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;74.122.70.108. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 20:59:37 CST 2025
;; MSG SIZE rcvd: 106
108.70.122.74.in-addr.arpa domain name pointer 108.70.122.74.static.foremosttech.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
108.70.122.74.in-addr.arpa name = 108.70.122.74.static.foremosttech.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
82.207.114.64 | attack | Lines containing failures of 82.207.114.64 Nov 23 08:41:01 shared09 sshd[14728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.114.64 user=r.r Nov 23 08:41:03 shared09 sshd[14728]: Failed password for r.r from 82.207.114.64 port 54406 ssh2 Nov 23 08:41:03 shared09 sshd[14728]: Received disconnect from 82.207.114.64 port 54406:11: Bye Bye [preauth] Nov 23 08:41:03 shared09 sshd[14728]: Disconnected from authenticating user r.r 82.207.114.64 port 54406 [preauth] Nov 23 08:57:56 shared09 sshd[19354]: Invalid user vidya from 82.207.114.64 port 57572 Nov 23 08:57:56 shared09 sshd[19354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.207.114.64 Nov 23 08:57:57 shared09 sshd[19354]: Failed password for invalid user vidya from 82.207.114.64 port 57572 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=82.207.114.64 |
2019-11-25 03:20:14 |
187.45.102.32 | attackspambots | Lines containing failures of 187.45.102.32 Nov 21 01:32:23 localhost sshd[60541]: Invalid user valliani from 187.45.102.32 port 43350 Nov 21 01:32:23 localhost sshd[60541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.45.102.32 Nov 21 01:32:25 localhost sshd[60541]: Failed password for invalid user valliani from 187.45.102.32 port 43350 ssh2 Nov 21 01:32:26 localhost sshd[60541]: Received disconnect from 187.45.102.32 port 43350:11: Bye Bye [preauth] Nov 21 01:32:26 localhost sshd[60541]: Disconnected from invalid user valliani 187.45.102.32 port 43350 [preauth] Nov 21 01:49:16 localhost sshd[61515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.45.102.32 user=r.r Nov 21 01:49:18 localhost sshd[61515]: Failed password for r.r from 187.45.102.32 port 56952 ssh2 Nov 21 01:49:20 localhost sshd[61515]: Received disconnect from 187.45.102.32 port 56952:11: Bye Bye [preauth] Nov 21 01........ ------------------------------ |
2019-11-25 02:57:05 |
51.75.52.127 | attackbotsspam | 51.75.52.127 was recorded 7 times by 6 hosts attempting to connect to the following ports: 9103,2068,5597,2552,2560,8807,9109. Incident counter (4h, 24h, all-time): 7, 61, 1575 |
2019-11-25 03:20:44 |
106.51.73.204 | attackbots | Nov 24 20:00:28 sauna sshd[210969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.73.204 Nov 24 20:00:29 sauna sshd[210969]: Failed password for invalid user yyy from 106.51.73.204 port 11939 ssh2 ... |
2019-11-25 03:02:44 |
34.217.91.152 | attack | 24.11.2019 15:49:34 - Bad Robot Ignore Robots.txt |
2019-11-25 03:13:53 |
51.68.143.224 | attack | Nov 24 19:32:05 SilenceServices sshd[30901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.143.224 Nov 24 19:32:08 SilenceServices sshd[30901]: Failed password for invalid user victor123 from 51.68.143.224 port 51818 ssh2 Nov 24 19:38:16 SilenceServices sshd[313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.143.224 |
2019-11-25 02:56:18 |
171.249.138.119 | attackbotsspam | SSH invalid-user multiple login try |
2019-11-25 03:12:32 |
195.29.105.125 | attack | Nov 24 19:06:58 ns382633 sshd\[4021\]: Invalid user oosterhout from 195.29.105.125 port 56270 Nov 24 19:06:58 ns382633 sshd\[4021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.29.105.125 Nov 24 19:07:01 ns382633 sshd\[4021\]: Failed password for invalid user oosterhout from 195.29.105.125 port 56270 ssh2 Nov 24 19:23:37 ns382633 sshd\[7046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.29.105.125 user=root Nov 24 19:23:40 ns382633 sshd\[7046\]: Failed password for root from 195.29.105.125 port 48442 ssh2 |
2019-11-25 03:26:33 |
206.189.45.199 | attack | DNS |
2019-11-25 03:29:54 |
43.249.194.245 | attackspam | SSH Brute Force, server-1 sshd[25425]: Failed password for root from 43.249.194.245 port 42223 ssh2 |
2019-11-25 03:04:00 |
85.113.210.58 | attackspambots | Nov 23 01:16:07 mail sshd[7442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.113.210.58 user=root Nov 23 01:16:09 mail sshd[7442]: Failed password for root from 85.113.210.58 port 48194 ssh2 Nov 23 01:37:09 mail sshd[10003]: Invalid user electric from 85.113.210.58 Nov 23 01:37:09 mail sshd[10003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.113.210.58 Nov 23 01:37:09 mail sshd[10003]: Invalid user electric from 85.113.210.58 Nov 23 01:37:11 mail sshd[10003]: Failed password for invalid user electric from 85.113.210.58 port 12289 ssh2 ... |
2019-11-25 03:18:54 |
85.214.212.148 | attackspam | Nov 24 20:13:07 nextcloud sshd\[4610\]: Invalid user server from 85.214.212.148 Nov 24 20:13:07 nextcloud sshd\[4610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.214.212.148 Nov 24 20:13:09 nextcloud sshd\[4610\]: Failed password for invalid user server from 85.214.212.148 port 59304 ssh2 ... |
2019-11-25 03:26:09 |
193.70.42.33 | attackbotsspam | Nov 24 19:25:11 markkoudstaal sshd[24609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.42.33 Nov 24 19:25:14 markkoudstaal sshd[24609]: Failed password for invalid user roy from 193.70.42.33 port 53060 ssh2 Nov 24 19:31:12 markkoudstaal sshd[25131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.42.33 |
2019-11-25 03:09:59 |
119.28.134.223 | attackspambots | 119.28.134.223 was recorded 62 times by 26 hosts attempting to connect to the following ports: 4243,2375,2377,2376. Incident counter (4h, 24h, all-time): 62, 357, 446 |
2019-11-25 03:10:54 |
103.101.52.48 | attack | Nov 24 19:13:18 sso sshd[17251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.101.52.48 Nov 24 19:13:20 sso sshd[17251]: Failed password for invalid user phion from 103.101.52.48 port 60096 ssh2 ... |
2019-11-25 03:02:58 |