City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.100.248.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41223
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.100.248.239. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 01:18:11 CST 2025
;; MSG SIZE rcvd: 108
Host 239.248.100.148.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 239.248.100.148.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
104.244.208.228 | attack | Port scan on 1 port(s): 25565 |
2020-03-20 02:48:00 |
34.240.253.132 | attackspam | Attempted connection to ports 22, 443, 80. |
2020-03-20 02:13:17 |
187.189.241.135 | attackspambots | Mar 19 18:37:37 marvibiene sshd[46219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.241.135 user=root Mar 19 18:37:39 marvibiene sshd[46219]: Failed password for root from 187.189.241.135 port 37374 ssh2 Mar 19 18:45:14 marvibiene sshd[46332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.241.135 user=root Mar 19 18:45:16 marvibiene sshd[46332]: Failed password for root from 187.189.241.135 port 38853 ssh2 ... |
2020-03-20 02:54:11 |
1.193.160.164 | attack | Mar 19 14:53:06 mout sshd[16613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.193.160.164 user=root Mar 19 14:53:09 mout sshd[16613]: Failed password for root from 1.193.160.164 port 58862 ssh2 |
2020-03-20 02:38:38 |
202.29.236.42 | attackspambots | Mar 19 16:37:54 MainVPS sshd[2509]: Invalid user chef from 202.29.236.42 port 44734 Mar 19 16:37:54 MainVPS sshd[2509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.236.42 Mar 19 16:37:54 MainVPS sshd[2509]: Invalid user chef from 202.29.236.42 port 44734 Mar 19 16:37:56 MainVPS sshd[2509]: Failed password for invalid user chef from 202.29.236.42 port 44734 ssh2 Mar 19 16:46:03 MainVPS sshd[18254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.236.42 user=root Mar 19 16:46:06 MainVPS sshd[18254]: Failed password for root from 202.29.236.42 port 53786 ssh2 ... |
2020-03-20 02:26:46 |
183.56.212.91 | attackspambots | Fail2Ban - SSH Bruteforce Attempt |
2020-03-20 02:41:34 |
49.235.161.88 | attackspambots | 2020-03-18 20:40:31 server sshd[76021]: Failed password for invalid user root from 49.235.161.88 port 47332 ssh2 |
2020-03-20 02:33:46 |
85.204.84.249 | attack | Port probing on unauthorized port 8080 |
2020-03-20 02:51:17 |
107.173.230.228 | attack | (From ettienne@rugoshath.com) I'm currently looking at businesses who are close to ranking on page one of Google, and noticed that your website https://www.doctorgala.com/ is currently in the top 100 pages of search results for "doctor", which is a profitable phrase we can build on and push up the rankings. I know you're very busy and I appreciate your time reading this. Would you like an edge over your competitors? If I could save you time and get you more leads would you be interested? I'd like to offer you the chance to discuss your business and see where you can make even MORE money, free of charge. If interested you can mail me anytime to discuss your business needs, we do everything from content and video creation, copywriting, competitor analysis, SEO, digital and social media marketing, Wordpress and sales funnel setup and design, email marketing campaigns and more. Everything you need to grow your business online. I'm also available on Skype should you prefer that over ema |
2020-03-20 02:24:24 |
114.231.41.149 | attack | smtp probe/invalid login attempt |
2020-03-20 02:18:35 |
157.230.91.45 | attack | Mar 19 15:25:30 tuxlinux sshd[34949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45 user=root Mar 19 15:25:32 tuxlinux sshd[34949]: Failed password for root from 157.230.91.45 port 60507 ssh2 Mar 19 15:25:30 tuxlinux sshd[34949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45 user=root Mar 19 15:25:32 tuxlinux sshd[34949]: Failed password for root from 157.230.91.45 port 60507 ssh2 Mar 19 15:27:36 tuxlinux sshd[34978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45 user=root ... |
2020-03-20 02:22:40 |
128.199.123.170 | attack | Mar 19 15:27:08 minden010 sshd[5845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.123.170 Mar 19 15:27:10 minden010 sshd[5845]: Failed password for invalid user chenggf from 128.199.123.170 port 42738 ssh2 Mar 19 15:37:05 minden010 sshd[10859]: Failed password for root from 128.199.123.170 port 34620 ssh2 ... |
2020-03-20 02:20:08 |
139.59.180.53 | attack | Mar 19 19:30:21 [host] sshd[2112]: Invalid user po Mar 19 19:30:21 [host] sshd[2112]: pam_unix(sshd:a Mar 19 19:30:23 [host] sshd[2112]: Failed password |
2020-03-20 02:43:29 |
49.232.58.113 | attack | 2020-03-19T18:43:38.542645shield sshd\[9261\]: Invalid user opensource from 49.232.58.113 port 40956 2020-03-19T18:43:38.550929shield sshd\[9261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.58.113 2020-03-19T18:43:40.632863shield sshd\[9261\]: Failed password for invalid user opensource from 49.232.58.113 port 40956 ssh2 2020-03-19T18:48:11.657135shield sshd\[10374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.58.113 user=root 2020-03-19T18:48:13.879845shield sshd\[10374\]: Failed password for root from 49.232.58.113 port 53296 ssh2 |
2020-03-20 02:52:23 |
200.105.234.131 | attack | fail2ban -- 200.105.234.131 ... |
2020-03-20 02:15:10 |