City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.219.248.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9502
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.219.248.2. IN A
;; AUTHORITY SECTION:
. 330 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:43:55 CST 2022
;; MSG SIZE rcvd: 106
Host 2.248.219.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 2.248.219.138.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
13.53.168.1 | attackspambots | Unauthorized connection attempt detected, IP banned. |
2020-02-01 16:11:25 |
13.57.231.141 | attackbots | Unauthorized connection attempt detected, IP banned. |
2020-02-01 16:11:09 |
52.49.157.60 | attack | 52.49.157.60 - - \[01/Feb/2020:05:54:29 +0100\] "GET / HTTP/1.1" 403 135 "-" "Mozilla/5.0 zgrab/0.x" ... |
2020-02-01 16:08:49 |
115.72.202.205 | attackbots | ssh failed login |
2020-02-01 16:29:40 |
209.141.48.68 | attackspambots | Unauthorized connection attempt detected from IP address 209.141.48.68 to port 2220 [J] |
2020-02-01 16:06:05 |
49.238.167.108 | attackspambots | Invalid user user from 49.238.167.108 port 47434 |
2020-02-01 16:00:47 |
162.243.129.21 | attackbots | Fail2Ban Ban Triggered |
2020-02-01 16:37:01 |
106.110.76.102 | attack | Feb 1 05:54:37 grey postfix/smtpd\[11451\]: NOQUEUE: reject: RCPT from unknown\[106.110.76.102\]: 554 5.7.1 Service unavailable\; Client host \[106.110.76.102\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[106.110.76.102\]\; from=\ |
2020-02-01 16:02:01 |
216.218.206.121 | attack | Feb 1 08:51:18 debian-2gb-nbg1-2 kernel: \[2802735.918244\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=216.218.206.121 DST=195.201.40.59 LEN=29 TOS=0x00 PREC=0x00 TTL=52 ID=25455 DF PROTO=UDP SPT=43664 DPT=1434 LEN=9 |
2020-02-01 16:20:52 |
182.252.133.71 | attack | Unauthorized connection attempt detected from IP address 182.252.133.71 to port 2220 [J] |
2020-02-01 15:56:37 |
54.219.172.70 | attackspam | Scan (80/tcp): /.env |
2020-02-01 16:20:15 |
222.186.30.145 | attackspam | Feb 1 11:08:48 server sshd\[25507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.145 user=root Feb 1 11:08:51 server sshd\[25507\]: Failed password for root from 222.186.30.145 port 48977 ssh2 Feb 1 11:08:52 server sshd\[25507\]: Failed password for root from 222.186.30.145 port 48977 ssh2 Feb 1 11:08:55 server sshd\[25507\]: Failed password for root from 222.186.30.145 port 48977 ssh2 Feb 1 11:18:43 server sshd\[27732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.145 user=root ... |
2020-02-01 16:20:38 |
206.72.194.222 | attack | Feb 1 13:12:29 gw1 sshd[7939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.72.194.222 Feb 1 13:12:31 gw1 sshd[7939]: Failed password for invalid user sinusbot1 from 206.72.194.222 port 39988 ssh2 ... |
2020-02-01 16:27:44 |
125.161.130.227 | attackbotsspam | (sshd) Failed SSH login from 125.161.130.227 (ID/Indonesia/227.subnet125-161-130.speedy.telkom.net.id): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 1 07:01:37 ubnt-55d23 sshd[29308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.161.130.227 user=root Feb 1 07:01:39 ubnt-55d23 sshd[29308]: Failed password for root from 125.161.130.227 port 15320 ssh2 |
2020-02-01 16:29:03 |
94.191.77.31 | attack | Unauthorized connection attempt detected from IP address 94.191.77.31 to port 2220 [J] |
2020-02-01 16:30:17 |