City: unknown
Region: unknown
Country: United States
Internet Service Provider: DigitalOcean LLC
Hostname: unknown
Organization: unknown
Usage Type: Data Center/Web Hosting/Transit
| Type | Details | Datetime |
|---|---|---|
| attackspambots | 2019-09-23T04:30:02.967889abusebot-8.cloudsearch.cf sshd\[12401\]: Invalid user membership from 104.248.80.78 port 48970 |
2019-09-23 12:53:42 |
| attack | Sep 21 07:08:36 vps647732 sshd[23630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 Sep 21 07:08:38 vps647732 sshd[23630]: Failed password for invalid user ftpuser from 104.248.80.78 port 37918 ssh2 ... |
2019-09-21 13:52:58 |
| attackspambots | Sep 13 23:33:23 hcbb sshd\[27758\]: Invalid user dv from 104.248.80.78 Sep 13 23:33:23 hcbb sshd\[27758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 Sep 13 23:33:25 hcbb sshd\[27758\]: Failed password for invalid user dv from 104.248.80.78 port 51206 ssh2 Sep 13 23:37:36 hcbb sshd\[28121\]: Invalid user ftpuser from 104.248.80.78 Sep 13 23:37:36 hcbb sshd\[28121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 |
2019-09-14 17:42:17 |
| attackbots | Sep 14 01:20:01 pornomens sshd\[19170\]: Invalid user htt from 104.248.80.78 port 39052 Sep 14 01:20:01 pornomens sshd\[19170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 Sep 14 01:20:03 pornomens sshd\[19170\]: Failed password for invalid user htt from 104.248.80.78 port 39052 ssh2 ... |
2019-09-14 08:25:35 |
| attack | Sep 7 04:15:42 yabzik sshd[24525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 Sep 7 04:15:45 yabzik sshd[24525]: Failed password for invalid user servers from 104.248.80.78 port 59698 ssh2 Sep 7 04:20:06 yabzik sshd[26032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 |
2019-09-07 09:20:12 |
| attackspambots | Aug 31 13:44:26 MK-Soft-VM3 sshd\[16203\]: Invalid user postgres from 104.248.80.78 port 41964 Aug 31 13:44:26 MK-Soft-VM3 sshd\[16203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 Aug 31 13:44:28 MK-Soft-VM3 sshd\[16203\]: Failed password for invalid user postgres from 104.248.80.78 port 41964 ssh2 ... |
2019-08-31 22:33:46 |
| attack | Aug 18 21:04:10 vps647732 sshd[6548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 Aug 18 21:04:12 vps647732 sshd[6548]: Failed password for invalid user flower from 104.248.80.78 port 54190 ssh2 ... |
2019-08-19 04:37:11 |
| attackspambots | Aug 13 14:23:27 yabzik sshd[2605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 Aug 13 14:23:29 yabzik sshd[2605]: Failed password for invalid user looque from 104.248.80.78 port 43118 ssh2 Aug 13 14:28:08 yabzik sshd[4582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 |
2019-08-13 19:41:17 |
| attackbotsspam | $f2bV_matches |
2019-08-10 14:50:23 |
| attack | Aug 8 00:33:59 server sshd\[12329\]: Invalid user TEST from 104.248.80.78 port 34876 Aug 8 00:33:59 server sshd\[12329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 Aug 8 00:34:01 server sshd\[12329\]: Failed password for invalid user TEST from 104.248.80.78 port 34876 ssh2 Aug 8 00:38:09 server sshd\[25832\]: Invalid user 123456 from 104.248.80.78 port 57594 Aug 8 00:38:09 server sshd\[25832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 |
2019-08-08 05:42:54 |
| attack | ssh failed login |
2019-08-07 13:58:26 |
| attack | Jul 7 06:35:35 dallas01 sshd[12745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 Jul 7 06:35:37 dallas01 sshd[12745]: Failed password for invalid user com1 from 104.248.80.78 port 36430 ssh2 Jul 7 06:37:41 dallas01 sshd[12988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 Jul 7 06:37:43 dallas01 sshd[12988]: Failed password for invalid user chao from 104.248.80.78 port 33438 ssh2 |
2019-07-31 16:25:17 |
| attackbots | Invalid user administrateur from 104.248.80.78 port 57778 |
2019-07-28 06:44:09 |
| attackspambots | $f2bV_matches |
2019-07-15 18:56:31 |
| attackbots | Jul 14 09:57:37 lnxweb61 sshd[25796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 |
2019-07-14 17:22:36 |
| attackbotsspam | Jul 5 09:58:39 fr01 sshd[5354]: Invalid user beavis from 104.248.80.78 Jul 5 09:58:39 fr01 sshd[5354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 Jul 5 09:58:39 fr01 sshd[5354]: Invalid user beavis from 104.248.80.78 Jul 5 09:58:42 fr01 sshd[5354]: Failed password for invalid user beavis from 104.248.80.78 port 41242 ssh2 ... |
2019-07-05 20:33:44 |
| attackspam | Jun 29 12:36:08 cp sshd[14928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 Jun 29 12:36:08 cp sshd[14928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 |
2019-06-29 22:03:02 |
| attackspam | Jun 25 19:24:19 lnxweb62 sshd[13334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 Jun 25 19:24:19 lnxweb62 sshd[13334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.80.78 |
2019-06-26 02:06:13 |
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.248.80.221 | attackbots | Port scan: Attack repeated for 24 hours |
2020-09-20 23:59:38 |
| 104.248.80.221 | attackbotsspam | " " |
2020-09-20 15:52:56 |
| 104.248.80.221 | attack | " " |
2020-09-20 07:43:05 |
| 104.248.80.221 | attackbotsspam | firewall-block, port(s): 24699/tcp |
2020-08-27 14:51:34 |
| 104.248.80.221 | attackbots | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-08-27 02:34:38 |
| 104.248.80.221 | attackspam | Port scan: Attack repeated for 24 hours |
2020-08-25 16:10:02 |
| 104.248.80.221 | attackspam | " " |
2020-08-02 13:43:40 |
| 104.248.80.221 | attackbotsspam | Port scan: Attack repeated for 24 hours |
2020-07-29 12:35:49 |
| 104.248.80.221 | attack | firewall-block, port(s): 20915/tcp |
2020-07-11 22:50:45 |
| 104.248.80.221 | attackbotsspam | firewall-block, port(s): 25955/tcp |
2020-05-20 15:07:42 |
| 104.248.80.221 | attackspam | Port scan(s) denied |
2020-05-10 17:17:12 |
| 104.248.80.221 | attackspam | firewall-block, port(s): 20473/tcp |
2020-05-09 05:43:20 |
| 104.248.80.221 | attack | " " |
2020-05-07 02:53:31 |
| 104.248.80.221 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 1572 resulting in total of 13 scans from 104.248.0.0/16 block. |
2020-04-25 23:47:06 |
| 104.248.80.163 | attack | [portscan] tcp/22 [SSH] [scan/connect: 3 time(s)] *(RWIN=65535)(07221037) |
2019-07-22 21:12:39 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.80.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48568
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.248.80.78. IN A
;; AUTHORITY SECTION:
. 2550 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019060302 1800 900 604800 86400
;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jun 04 10:23:22 CST 2019
;; MSG SIZE rcvd: 117
Host 78.80.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 67.207.67.2
Address: 67.207.67.2#53
** server can't find 78.80.248.104.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 164.52.24.164 | attack | SSH-bruteforce attempts |
2019-10-13 12:06:49 |
| 107.179.95.9 | attackspambots | SSH Brute Force, server-1 sshd[23031]: Failed password for invalid user P4rol41! from 107.179.95.9 port 52538 ssh2 |
2019-10-13 08:16:46 |
| 60.248.28.105 | attackbots | Oct 12 14:24:27 kapalua sshd\[5240\]: Invalid user Caramel2016 from 60.248.28.105 Oct 12 14:24:27 kapalua sshd\[5240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60-248-28-105.hinet-ip.hinet.net Oct 12 14:24:29 kapalua sshd\[5240\]: Failed password for invalid user Caramel2016 from 60.248.28.105 port 43929 ssh2 Oct 12 14:28:25 kapalua sshd\[5557\]: Invalid user Alain2016 from 60.248.28.105 Oct 12 14:28:25 kapalua sshd\[5557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60-248-28-105.hinet-ip.hinet.net |
2019-10-13 08:29:45 |
| 167.114.0.23 | attack | $f2bV_matches |
2019-10-13 08:20:28 |
| 162.247.73.192 | attack | Oct 13 00:27:40 vpn01 sshd[9276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.73.192 Oct 13 00:27:41 vpn01 sshd[9276]: Failed password for invalid user dbuser from 162.247.73.192 port 59492 ssh2 ... |
2019-10-13 08:01:54 |
| 2408:8240:7c01:1f58:4c5a:2cc8:7dc3:4164 | attackspam | Forged login request. |
2019-10-13 12:11:21 |
| 180.76.238.70 | attackbots | SSH Brute Force, server-1 sshd[23000]: Failed password for root from 180.76.238.70 port 51836 ssh2 |
2019-10-13 08:10:10 |
| 222.186.175.169 | attack | SSH Brute Force, server-1 sshd[22937]: Failed password for root from 222.186.175.169 port 11542 ssh2 |
2019-10-13 08:05:11 |
| 159.203.73.181 | attackspambots | Failed SSH Login |
2019-10-13 07:56:08 |
| 198.144.184.34 | attackbots | Oct 13 00:26:55 MK-Soft-VM3 sshd[27370]: Failed password for root from 198.144.184.34 port 40707 ssh2 ... |
2019-10-13 07:57:42 |
| 160.153.244.245 | attack | Automatic report - XMLRPC Attack |
2019-10-13 08:27:00 |
| 180.76.160.147 | attackbotsspam | SSH Brute Force, server-1 sshd[22961]: Failed password for root from 180.76.160.147 port 58688 ssh2 |
2019-10-13 08:10:43 |
| 118.70.182.185 | attackspambots | Oct 13 01:52:39 OPSO sshd\[21174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.182.185 user=root Oct 13 01:52:42 OPSO sshd\[21174\]: Failed password for root from 118.70.182.185 port 59538 ssh2 Oct 13 01:57:18 OPSO sshd\[22049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.182.185 user=root Oct 13 01:57:20 OPSO sshd\[22049\]: Failed password for root from 118.70.182.185 port 38702 ssh2 Oct 13 02:01:55 OPSO sshd\[23036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.182.185 user=root |
2019-10-13 08:22:38 |
| 164.132.98.75 | attackspam | SSH Brute Force, server-1 sshd[19403]: Failed password for root from 164.132.98.75 port 33339 ssh2 |
2019-10-13 08:11:10 |
| 206.81.8.14 | attack | 2019-10-12T23:32:36.408222abusebot.cloudsearch.cf sshd\[1352\]: Invalid user Diego123 from 206.81.8.14 port 44718 |
2019-10-13 08:24:18 |