City: unknown
Region: unknown
Country: Singapore
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
104.248.145.254 | attackbots | [N1.H1.VM1] Port Scanner Detected Blocked by UFW |
2020-09-29 04:25:26 |
104.248.145.254 | attack | [N3.H3.VM3] Port Scanner Detected Blocked by UFW |
2020-09-28 20:40:54 |
104.248.145.254 | attackspam | firewall-block, port(s): 4205/tcp |
2020-09-28 12:47:46 |
104.248.145.254 | attack |
|
2020-09-04 03:43:34 |
104.248.145.254 | attackspam | TCP ports : 11182 / 15830 |
2020-09-03 19:19:07 |
104.248.145.254 | attack |
|
2020-08-13 04:54:36 |
104.248.145.254 | attackbots | " " |
2020-08-07 07:34:25 |
104.248.145.254 | attack | Aug 6 16:45:53 debian-2gb-nbg1-2 kernel: \[18983609.468139\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=104.248.145.254 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x40 TTL=242 ID=16833 PROTO=TCP SPT=43412 DPT=32345 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-08-07 03:27:55 |
104.248.145.254 | attackbots | scans once in preceeding hours on the ports (in chronological order) 8748 resulting in total of 6 scans from 104.248.0.0/16 block. |
2020-08-05 20:37:31 |
104.248.145.254 | attackbotsspam |
|
2020-08-02 23:36:48 |
104.248.145.254 | attack | Port scan denied |
2020-07-28 02:07:35 |
104.248.145.254 | attackbots | firewall-block, port(s): 8532/tcp |
2020-07-18 19:01:14 |
104.248.145.254 | attackspam | firewall-block, port(s): 29634/tcp |
2020-07-07 00:13:46 |
104.248.145.163 | attackspam | Invalid user acj from 104.248.145.163 port 60982 |
2020-02-12 02:45:08 |
104.248.145.163 | attackbots | Jan 31 00:05:40 php1 sshd\[4148\]: Invalid user sumita from 104.248.145.163 Jan 31 00:05:40 php1 sshd\[4148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.145.163 Jan 31 00:05:42 php1 sshd\[4148\]: Failed password for invalid user sumita from 104.248.145.163 port 49590 ssh2 Jan 31 00:09:03 php1 sshd\[4514\]: Invalid user ilavalagi from 104.248.145.163 Jan 31 00:09:03 php1 sshd\[4514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.145.163 |
2020-01-31 18:14:00 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.145.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9420
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.248.145.79. IN A
;; AUTHORITY SECTION:
. 260 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023011200 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 12 17:14:30 CST 2023
;; MSG SIZE rcvd: 107
79.145.248.104.in-addr.arpa domain name pointer fungsi101.my.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
79.145.248.104.in-addr.arpa name = fungsi101.my.id.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
187.202.227.47 | attackbotsspam | Unauthorized connection attempt detected from IP address 187.202.227.47 to port 23 [J] |
2020-01-27 17:51:34 |
109.92.20.69 | attackspambots | Unauthorized connection attempt detected from IP address 109.92.20.69 to port 80 [J] |
2020-01-27 17:37:34 |
37.44.215.45 | attackspam | Unauthorized connection attempt detected from IP address 37.44.215.45 to port 23 [J] |
2020-01-27 17:17:45 |
78.134.15.127 | attack | Unauthorized connection attempt detected from IP address 78.134.15.127 to port 2220 [J] |
2020-01-27 17:40:37 |
90.90.168.187 | attackspambots | Unauthorized connection attempt detected from IP address 90.90.168.187 to port 2220 [J] |
2020-01-27 17:11:41 |
65.38.70.244 | attackspam | Unauthorized connection attempt detected from IP address 65.38.70.244 to port 5555 [J] |
2020-01-27 17:13:07 |
114.216.202.208 | attackspam | Unauthorized connection attempt detected from IP address 114.216.202.208 to port 2220 [J] |
2020-01-27 17:08:06 |
46.63.64.120 | attackspam | Unauthorized connection attempt detected from IP address 46.63.64.120 to port 23 [J] |
2020-01-27 17:16:51 |
61.28.108.122 | attackbotsspam | Unauthorized connection attempt detected from IP address 61.28.108.122 to port 2220 [J] |
2020-01-27 17:14:13 |
47.103.10.13 | attackspam | Unauthorized connection attempt detected from IP address 47.103.10.13 to port 23 [J] |
2020-01-27 17:42:34 |
148.70.186.70 | attack | Unauthorized connection attempt detected from IP address 148.70.186.70 to port 2220 [J] |
2020-01-27 17:30:56 |
122.51.68.105 | attack | Unauthorized connection attempt detected from IP address 122.51.68.105 to port 2220 [J] |
2020-01-27 17:33:30 |
175.211.38.245 | attackspambots | Unauthorized connection attempt detected from IP address 175.211.38.245 to port 5555 [J] |
2020-01-27 17:55:38 |
1.202.112.234 | attack | Unauthorized connection attempt detected from IP address 1.202.112.234 to port 6666 [J] |
2020-01-27 17:19:26 |
182.76.94.134 | attackspambots | Unauthorized connection attempt detected from IP address 182.76.94.134 to port 139 [J] |
2020-01-27 17:51:49 |