City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.2.121.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54588
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;147.2.121.48. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 14:11:52 CST 2025
;; MSG SIZE rcvd: 105
Host 48.121.2.147.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 48.121.2.147.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.38.186.47 | attackspambots | Dec 8 18:14:18 linuxvps sshd\[29041\]: Invalid user wwwadmin from 51.38.186.47 Dec 8 18:14:18 linuxvps sshd\[29041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.47 Dec 8 18:14:20 linuxvps sshd\[29041\]: Failed password for invalid user wwwadmin from 51.38.186.47 port 42718 ssh2 Dec 8 18:19:16 linuxvps sshd\[32454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.47 user=root Dec 8 18:19:19 linuxvps sshd\[32454\]: Failed password for root from 51.38.186.47 port 51332 ssh2 |
2019-12-09 07:30:58 |
| 41.207.184.179 | attackspam | 2019-12-08T22:59:47.804212abusebot-2.cloudsearch.cf sshd\[10750\]: Invalid user stungaard from 41.207.184.179 port 42810 |
2019-12-09 07:22:50 |
| 106.12.36.122 | attack | Dec 9 01:54:23 server sshd\[7226\]: Invalid user andrew from 106.12.36.122 Dec 9 01:54:23 server sshd\[7226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.36.122 Dec 9 01:54:25 server sshd\[7226\]: Failed password for invalid user andrew from 106.12.36.122 port 46370 ssh2 Dec 9 02:10:08 server sshd\[11766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.36.122 user=root Dec 9 02:10:10 server sshd\[11766\]: Failed password for root from 106.12.36.122 port 48480 ssh2 ... |
2019-12-09 07:17:31 |
| 142.112.115.160 | attackbots | 2019-12-08T23:30:58.412518abusebot-6.cloudsearch.cf sshd\[5751\]: Invalid user gennetten from 142.112.115.160 port 44368 |
2019-12-09 07:32:13 |
| 159.89.115.126 | attackspambots | Dec 9 00:11:12 sd-53420 sshd\[9896\]: Invalid user kaede from 159.89.115.126 Dec 9 00:11:12 sd-53420 sshd\[9896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.126 Dec 9 00:11:14 sd-53420 sshd\[9896\]: Failed password for invalid user kaede from 159.89.115.126 port 56798 ssh2 Dec 9 00:16:44 sd-53420 sshd\[10822\]: Invalid user anjen from 159.89.115.126 Dec 9 00:16:44 sd-53420 sshd\[10822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.126 ... |
2019-12-09 07:18:43 |
| 134.209.156.57 | attackspam | Dec 8 13:13:39 php1 sshd\[30674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.156.57 user=root Dec 8 13:13:41 php1 sshd\[30674\]: Failed password for root from 134.209.156.57 port 46510 ssh2 Dec 8 13:21:35 php1 sshd\[31864\]: Invalid user asterisk from 134.209.156.57 Dec 8 13:21:35 php1 sshd\[31864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.156.57 Dec 8 13:21:37 php1 sshd\[31864\]: Failed password for invalid user asterisk from 134.209.156.57 port 54966 ssh2 |
2019-12-09 07:33:24 |
| 137.74.185.204 | attackspambots | Dec 7 22:06:03 lvps92-51-164-246 sshd[9535]: Failed password for invalid user r.r from 137.74.185.204 port 38392 ssh2 Dec 7 22:06:04 lvps92-51-164-246 sshd[9535]: Received disconnect from 137.74.185.204: 11: Bye Bye [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=137.74.185.204 |
2019-12-09 07:38:40 |
| 190.64.68.180 | attackspam | Dec 8 23:59:48 ns381471 sshd[3080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.180 Dec 8 23:59:50 ns381471 sshd[3080]: Failed password for invalid user i89op0 from 190.64.68.180 port 4065 ssh2 |
2019-12-09 07:19:13 |
| 51.75.30.199 | attackspam | Dec 8 23:54:47 tux-35-217 sshd\[12625\]: Invalid user ottmar from 51.75.30.199 port 56719 Dec 8 23:54:47 tux-35-217 sshd\[12625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.30.199 Dec 8 23:54:49 tux-35-217 sshd\[12625\]: Failed password for invalid user ottmar from 51.75.30.199 port 56719 ssh2 Dec 8 23:59:37 tux-35-217 sshd\[12707\]: Invalid user carling from 51.75.30.199 port 60590 Dec 8 23:59:37 tux-35-217 sshd\[12707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.30.199 ... |
2019-12-09 07:07:15 |
| 185.176.27.118 | attackspam | Dec 8 23:54:30 mc1 kernel: \[ 4516.493159\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.118 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=57579 PROTO=TCP SPT=42880 DPT=8444 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 8 23:59:38 mc1 kernel: \[ 4825.098299\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.118 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=42003 PROTO=TCP SPT=42880 DPT=60200 WINDOW=1024 RES=0x00 SYN URGP=0 Dec 8 23:59:47 mc1 kernel: \[ 4834.249487\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.118 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=53907 PROTO=TCP SPT=42880 DPT=5020 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-12-09 07:20:57 |
| 118.89.33.81 | attack | Dec 8 22:34:42 XXX sshd[46299]: Invalid user agt from 118.89.33.81 port 45956 |
2019-12-09 07:06:17 |
| 45.251.117.144 | attack | port scan |
2019-12-09 07:29:35 |
| 185.36.81.236 | attackbots | 2019-12-08T22:02:25.101079MailD postfix/smtpd[14096]: warning: unknown[185.36.81.236]: SASL LOGIN authentication failed: authentication failure 2019-12-08T23:00:57.981820MailD postfix/smtpd[18486]: warning: unknown[185.36.81.236]: SASL LOGIN authentication failed: authentication failure 2019-12-08T23:59:33.348860MailD postfix/smtpd[22513]: warning: unknown[185.36.81.236]: SASL LOGIN authentication failed: authentication failure |
2019-12-09 07:34:38 |
| 42.200.206.225 | attackbotsspam | Dec 8 17:53:16 TORMINT sshd\[17668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.206.225 user=root Dec 8 17:53:17 TORMINT sshd\[17668\]: Failed password for root from 42.200.206.225 port 41054 ssh2 Dec 8 17:59:24 TORMINT sshd\[18198\]: Invalid user pillman from 42.200.206.225 Dec 8 17:59:24 TORMINT sshd\[18198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.206.225 ... |
2019-12-09 07:22:33 |
| 106.54.134.145 | attackspam | Dec 8 18:11:40 ny01 sshd[11698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.134.145 Dec 8 18:11:42 ny01 sshd[11698]: Failed password for invalid user test from 106.54.134.145 port 57296 ssh2 Dec 8 18:17:30 ny01 sshd[12310]: Failed password for root from 106.54.134.145 port 58658 ssh2 |
2019-12-09 07:19:36 |