City: unknown
Region: unknown
Country: United States
Internet Service Provider: Global Frag Networks
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
Type | Details | Datetime |
---|---|---|
attack | Nov 19 13:47:22 mxgate1 postfix/postscreen[7608]: CONNECT from [104.148.21.248]:33592 to [176.31.12.44]:25 Nov 19 13:47:22 mxgate1 postfix/dnsblog[7610]: addr 104.148.21.248 listed by domain zen.spamhaus.org as 127.0.0.3 Nov 19 13:47:22 mxgate1 postfix/dnsblog[7609]: addr 104.148.21.248 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 19 13:47:28 mxgate1 postfix/postscreen[7608]: DNSBL rank 3 for [104.148.21.248]:33592 Nov x@x Nov 19 13:47:29 mxgate1 postfix/postscreen[7608]: DISCONNECT [104.148.21.248]:33592 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=104.148.21.248 |
2019-11-19 22:51:50 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.148.21.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20003
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.148.21.248. IN A
;; AUTHORITY SECTION:
. 240 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019111900 1800 900 604800 86400
;; Query time: 234 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 19 22:51:42 CST 2019
;; MSG SIZE rcvd: 118
Host 248.21.148.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 248.21.148.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
104.168.71.152 | attackspam | (sshd) Failed SSH login from 104.168.71.152 (US/United States/104-168-71-152-host.colocrossing.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 18 09:34:51 amsweb01 sshd[10984]: Invalid user www-data from 104.168.71.152 port 56111 Jun 18 09:34:53 amsweb01 sshd[10984]: Failed password for invalid user www-data from 104.168.71.152 port 56111 ssh2 Jun 18 09:40:33 amsweb01 sshd[11763]: Invalid user sftp_user from 104.168.71.152 port 55927 Jun 18 09:40:35 amsweb01 sshd[11763]: Failed password for invalid user sftp_user from 104.168.71.152 port 55927 ssh2 Jun 18 09:51:31 amsweb01 sshd[13339]: Invalid user ninja from 104.168.71.152 port 55567 |
2020-06-18 16:19:44 |
103.219.195.79 | attackbotsspam | Jun 18 07:57:58 vps647732 sshd[30719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.195.79 Jun 18 07:58:00 vps647732 sshd[30719]: Failed password for invalid user camila from 103.219.195.79 port 59914 ssh2 ... |
2020-06-18 16:56:50 |
51.83.75.97 | attackspambots | Invalid user runner from 51.83.75.97 port 32868 |
2020-06-18 16:26:39 |
189.90.111.74 | attackbotsspam | Jun 18 05:00:22 mail.srvfarm.net postfix/smtps/smtpd[1337852]: warning: 189-90-111-74.life.com.br[189.90.111.74]: SASL PLAIN authentication failed: Jun 18 05:00:22 mail.srvfarm.net postfix/smtps/smtpd[1337852]: lost connection after AUTH from 189-90-111-74.life.com.br[189.90.111.74] Jun 18 05:09:51 mail.srvfarm.net postfix/smtpd[1339035]: warning: 189-90-111-74.life.com.br[189.90.111.74]: SASL PLAIN authentication failed: Jun 18 05:09:52 mail.srvfarm.net postfix/smtpd[1339035]: lost connection after AUTH from 189-90-111-74.life.com.br[189.90.111.74] Jun 18 05:10:06 mail.srvfarm.net postfix/smtps/smtpd[1337852]: warning: 189-90-111-74.life.com.br[189.90.111.74]: SASL PLAIN authentication failed: |
2020-06-18 16:43:43 |
193.35.48.18 | attackbotsspam | Jun 18 05:42:45 mail postfix/smtpd\[22784\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 18 05:43:06 mail postfix/smtpd\[22784\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 18 06:28:34 mail postfix/smtpd\[22774\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 18 06:28:54 mail postfix/smtpd\[24235\]: warning: unknown\[193.35.48.18\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-06-18 16:31:18 |
97.90.110.160 | attackspam | *Port Scan* detected from 97.90.110.160 (US/United States/Oregon/Grants Pass/097-090-110-160.biz.spectrum.com). 4 hits in the last 75 seconds |
2020-06-18 16:50:55 |
49.51.90.60 | attack | Jun 18 08:22:41 ip-172-31-61-156 sshd[28849]: Failed password for invalid user matias from 49.51.90.60 port 46416 ssh2 Jun 18 08:22:39 ip-172-31-61-156 sshd[28849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.51.90.60 Jun 18 08:22:39 ip-172-31-61-156 sshd[28849]: Invalid user matias from 49.51.90.60 Jun 18 08:22:41 ip-172-31-61-156 sshd[28849]: Failed password for invalid user matias from 49.51.90.60 port 46416 ssh2 Jun 18 08:26:41 ip-172-31-61-156 sshd[29040]: Invalid user apollo from 49.51.90.60 ... |
2020-06-18 16:55:57 |
111.229.248.168 | attack | Invalid user sales1 from 111.229.248.168 port 33402 |
2020-06-18 16:55:09 |
68.168.133.109 | attack | Invalid user support from 68.168.133.109 port 50992 |
2020-06-18 16:38:06 |
93.174.93.195 | attack |
|
2020-06-18 16:57:11 |
218.92.0.220 | attackspam | Unauthorized connection attempt detected from IP address 218.92.0.220 to port 22 |
2020-06-18 16:17:20 |
87.251.74.30 | attack | [portscan] tcp/22 [SSH] [scan/connect: 7 time(s)] in blocklist.de:'listed [ssh]' *(RWIN=29200)(06180840) |
2020-06-18 16:17:00 |
74.84.150.75 | attackspambots | Lines containing failures of 74.84.150.75 (max 1000) Jun 18 03:51:19 UTC__SANYALnet-Labs__cac12 sshd[3059]: Connection from 74.84.150.75 port 50931 on 64.137.176.96 port 22 Jun 18 03:51:19 UTC__SANYALnet-Labs__cac12 sshd[3059]: Bad protocol version identification 'CONNECT 45.33.35.141:80 HTTP/1.0' from 74.84.150.75 port 50931 Jun 18 03:51:19 UTC__SANYALnet-Labs__cac12 sshd[3060]: Connection from 74.84.150.75 port 50980 on 64.137.176.96 port 22 Jun 18 03:51:19 UTC__SANYALnet-Labs__cac12 sshd[3060]: Did not receive identification string from 74.84.150.75 port 50980 Jun 18 03:51:19 UTC__SANYALnet-Labs__cac12 sshd[3061]: Connection from 74.84.150.75 port 51008 on 64.137.176.96 port 22 Jun 18 03:51:19 UTC__SANYALnet-Labs__cac12 sshd[3061]: Did not receive identification string from 74.84.150.75 port 51008 Jun 18 03:51:19 UTC__SANYALnet-Labs__cac12 sshd[3062]: Connection from 74.84.150.75 port 51030 on 64.137.176.96 port 22 Jun 18 03:51:19 UTC__SANYALnet-Labs__cac12 sshd[3062]........ ------------------------------ |
2020-06-18 16:13:53 |
46.38.150.193 | attackspam | Jun 18 10:43:30 srv01 postfix/smtpd\[14876\]: warning: unknown\[46.38.150.193\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 18 10:43:39 srv01 postfix/smtpd\[29027\]: warning: unknown\[46.38.150.193\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 18 10:43:42 srv01 postfix/smtpd\[8072\]: warning: unknown\[46.38.150.193\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 18 10:43:54 srv01 postfix/smtpd\[14876\]: warning: unknown\[46.38.150.193\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jun 18 10:44:25 srv01 postfix/smtpd\[14876\]: warning: unknown\[46.38.150.193\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-06-18 16:47:21 |
167.99.123.34 | attackspam | Automatic report - XMLRPC Attack |
2020-06-18 16:18:38 |