City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.48.104.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6473
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.48.104.78. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:20:22 CST 2025
;; MSG SIZE rcvd: 105
78.104.48.13.in-addr.arpa domain name pointer ec2-13-48-104-78.eu-north-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
78.104.48.13.in-addr.arpa name = ec2-13-48-104-78.eu-north-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 198.143.133.154 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-20 01:31:14 |
| 119.145.148.219 | attack | B: /wp-login.php attack |
2020-02-20 01:08:36 |
| 212.83.183.57 | attackspam | Brute-force attempt banned |
2020-02-20 01:19:50 |
| 103.239.252.66 | attack | 1582124197 - 02/19/2020 15:56:37 Host: 103.239.252.66/103.239.252.66 Port: 445 TCP Blocked |
2020-02-20 01:24:23 |
| 99.44.37.243 | attackbotsspam | Chat Spam |
2020-02-20 00:55:46 |
| 94.180.250.158 | attackspambots | [18/Feb/2020:11:13:35 -0500] - [18/Feb/2020:11:13:37 -0500] Think php probe script |
2020-02-20 01:34:43 |
| 80.86.226.42 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 19-02-2020 13:35:15. |
2020-02-20 01:15:37 |
| 14.236.213.235 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 19-02-2020 13:35:14. |
2020-02-20 01:16:26 |
| 103.253.42.59 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-20 01:14:02 |
| 222.186.15.91 | attack | 19.02.2020 17:05:29 SSH access blocked by firewall |
2020-02-20 01:02:34 |
| 31.210.177.57 | attack | AbusiveCrawling |
2020-02-20 01:24:38 |
| 185.86.77.163 | attackspambots | Automatic report - XMLRPC Attack |
2020-02-20 01:29:27 |
| 119.187.151.218 | attack | Brute force attempt |
2020-02-20 01:35:48 |
| 51.83.76.139 | attackspambots | (sshd) Failed SSH login from 51.83.76.139 (FR/France/139.ip-51-83-76.eu): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 19 13:35:11 andromeda sshd[28577]: Invalid user abass from 51.83.76.139 port 57930 Feb 19 13:35:13 andromeda sshd[28577]: Failed password for invalid user abass from 51.83.76.139 port 57930 ssh2 Feb 19 13:35:15 andromeda sshd[28577]: Failed password for invalid user abass from 51.83.76.139 port 57930 ssh2 |
2020-02-20 01:08:57 |
| 103.242.2.77 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-20 01:17:04 |