City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.139.48.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.139.48.66. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 02:49:45 CST 2022
;; MSG SIZE rcvd: 106
Host 66.48.139.103.in-addr.arpa not found: 2(SERVFAIL)
server can't find 103.139.48.66.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
103.207.39.195 | attackbots | >120 unauthorized SSH connections |
2019-08-07 17:13:01 |
91.239.5.9 | attackspam | GET /.git/config HTTP/1.1 403 292 python-requests/2.22.0 |
2019-08-07 17:38:05 |
164.132.196.98 | attack | blacklist username julio Invalid user julio from 164.132.196.98 port 42396 |
2019-08-07 17:51:03 |
85.209.0.11 | attack | Multiport scan : 290 ports scanned 10094 10235 10439 11191 13088 13293 13948 14008 14062 14109 14148 14194 14398 14602 14620 14764 15087 15288 15420 17502 17513 17749 17750 17793 17909 18145 18156 18200 18244 18286 18405 18417 18868 18944 19047 19115 19189 19455 19511 19975 20254 20458 20544 20650 20654 20679 20683 20717 20866 21081 21114 21306 21404 21447 21522 21608 21628 21715 21918 22246 22329 22435 22487 22510 22536 22592 22648 ..... |
2019-08-07 16:46:00 |
121.8.124.244 | attackbotsspam | Aug 7 04:15:20 plusreed sshd[18923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.8.124.244 user=jenkins Aug 7 04:15:22 plusreed sshd[18923]: Failed password for jenkins from 121.8.124.244 port 14867 ssh2 ... |
2019-08-07 17:22:40 |
218.92.0.205 | attackbotsspam | Aug 7 09:03:34 MK-Soft-VM3 sshd\[21143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.205 user=root Aug 7 09:03:36 MK-Soft-VM3 sshd\[21143\]: Failed password for root from 218.92.0.205 port 11390 ssh2 Aug 7 09:03:39 MK-Soft-VM3 sshd\[21143\]: Failed password for root from 218.92.0.205 port 11390 ssh2 ... |
2019-08-07 17:06:56 |
114.39.29.66 | attackbotsspam | : |
2019-08-07 17:23:16 |
219.237.74.24 | attackspam | Aug 7 10:16:30 vserver sshd\[13641\]: Invalid user note from 219.237.74.24Aug 7 10:16:32 vserver sshd\[13641\]: Failed password for invalid user note from 219.237.74.24 port 53679 ssh2Aug 7 10:19:59 vserver sshd\[13665\]: Invalid user student from 219.237.74.24Aug 7 10:20:01 vserver sshd\[13665\]: Failed password for invalid user student from 219.237.74.24 port 40808 ssh2 ... |
2019-08-07 17:44:39 |
47.95.120.71 | attackbotsspam | fail2ban honeypot |
2019-08-07 17:42:37 |
80.211.242.211 | attack | Aug 7 04:48:46 plusreed sshd[1690]: Invalid user trading from 80.211.242.211 ... |
2019-08-07 16:55:14 |
103.104.17.139 | attackspambots | SSH/22 MH Probe, BF, Hack - |
2019-08-07 17:03:12 |
109.191.149.255 | attackspam | RU - - [06 Aug 2019:19:31:48 +0300] HEAD redirect ?go=http: hqtube.mobi HTTP 1.1 302 - - Xenu Link Sleuth 1.3.8 |
2019-08-07 17:02:47 |
106.51.50.2 | attack | Aug 7 09:27:44 mout sshd[30593]: Invalid user sebastian from 106.51.50.2 port 45851 |
2019-08-07 17:37:11 |
168.90.117.164 | attackbotsspam | Automatic report - Port Scan Attack |
2019-08-07 17:47:00 |
81.22.45.90 | attackbotsspam | Aug 7 09:24:06 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.90 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=50665 PROTO=TCP SPT=57755 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-08-07 17:26:04 |