City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.239.50.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20796
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;147.239.50.148. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025070401 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 05 08:14:09 CST 2025
;; MSG SIZE rcvd: 107
b'Host 148.50.239.147.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 147.239.50.148.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 117.6.135.141 | attackspam | Unauthorized connection attempt from IP address 117.6.135.141 on Port 445(SMB) |
2020-05-20 21:05:32 |
| 95.226.225.34 | attack | Unauthorized connection attempt from IP address 95.226.225.34 on Port 445(SMB) |
2020-05-20 20:59:09 |
| 45.125.222.120 | attackbots | May 20 14:52:07 ns41 sshd[25982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120 May 20 14:52:07 ns41 sshd[25982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120 |
2020-05-20 21:06:27 |
| 188.254.110.205 | attackbots | Invalid user mvl from 188.254.110.205 port 4545 |
2020-05-20 20:41:23 |
| 185.220.101.207 | attack | detected by Fail2Ban |
2020-05-20 21:09:04 |
| 161.82.141.154 | attackbotsspam | Unauthorized connection attempt from IP address 161.82.141.154 on Port 445(SMB) |
2020-05-20 20:50:17 |
| 139.59.145.130 | attackspam | Invalid user cxzhou from 139.59.145.130 port 53572 |
2020-05-20 21:07:42 |
| 49.232.173.147 | attackbots | 476. On May 17 2020 experienced a Brute Force SSH login attempt -> 27 unique times by 49.232.173.147. |
2020-05-20 20:49:29 |
| 49.232.72.56 | attackbotsspam | 478. On May 17 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 49.232.72.56. |
2020-05-20 20:47:23 |
| 116.96.42.94 | attackspam | Unauthorized connection attempt from IP address 116.96.42.94 on Port 445(SMB) |
2020-05-20 21:11:06 |
| 46.173.4.39 | attack | 473. On May 17 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 46.173.4.39. |
2020-05-20 20:54:21 |
| 49.234.47.124 | attackspam | Repeated brute force against a port |
2020-05-20 20:40:32 |
| 124.156.218.80 | attackspam | Invalid user vzw from 124.156.218.80 port 47700 |
2020-05-20 20:51:06 |
| 59.124.205.214 | attackspam | May 20 09:40:34 ws19vmsma01 sshd[42769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.205.214 May 20 09:40:37 ws19vmsma01 sshd[42769]: Failed password for invalid user vk from 59.124.205.214 port 53542 ssh2 ... |
2020-05-20 20:56:39 |
| 58.27.99.112 | attackbotsspam | May 20 10:27:26 lnxded63 sshd[8062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.27.99.112 |
2020-05-20 20:39:46 |