City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.11.210.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.11.210.213. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 15:24:36 CST 2025
;; MSG SIZE rcvd: 107
Host 213.210.11.148.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 213.210.11.148.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
198.27.70.174 | attack | Automatic report - Banned IP Access |
2019-09-09 01:36:21 |
211.64.67.48 | attack | Sep 8 12:57:46 lnxded63 sshd[28623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.64.67.48 |
2019-09-09 01:29:41 |
142.44.184.226 | attack | Sep 8 19:31:11 SilenceServices sshd[10736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.184.226 Sep 8 19:31:14 SilenceServices sshd[10736]: Failed password for invalid user 123456 from 142.44.184.226 port 54302 ssh2 Sep 8 19:36:28 SilenceServices sshd[14589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.184.226 |
2019-09-09 01:44:03 |
149.56.44.101 | attackspam | Sep 8 20:22:05 localhost sshd[14514]: Invalid user chris from 149.56.44.101 port 47564 ... |
2019-09-09 01:41:30 |
104.219.232.114 | attack | Sep810:08:04server2pure-ftpd:\(\?@104.219.232.114\)[WARNING]Authenticationfailedforuser[morgenstern-swiss]Sep810:08:09server2pure-ftpd:\(\?@104.219.232.114\)[WARNING]Authenticationfailedforuser[morgenstern-swiss]Sep810:08:15server2pure-ftpd:\(\?@104.219.232.114\)[WARNING]Authenticationfailedforuser[morgenstern-swiss]Sep810:08:19server2pure-ftpd:\(\?@104.219.232.114\)[WARNING]Authenticationfailedforuser[morgenstern-swiss]Sep810:08:25server2pure-ftpd:\(\?@104.219.232.114\)[WARNING]Authenticationfailedforuser[morgenstern-swiss] |
2019-09-09 02:06:37 |
46.25.31.59 | attackbots | Port Scan: TCP/23 |
2019-09-09 01:21:29 |
77.42.78.89 | attack | scan z |
2019-09-09 01:19:31 |
202.131.102.78 | attack | Sep 8 04:12:38 sachi sshd\[28287\]: Invalid user minecraft from 202.131.102.78 Sep 8 04:12:38 sachi sshd\[28287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.102.78 Sep 8 04:12:39 sachi sshd\[28287\]: Failed password for invalid user minecraft from 202.131.102.78 port 35032 ssh2 Sep 8 04:17:22 sachi sshd\[28696\]: Invalid user ts from 202.131.102.78 Sep 8 04:17:22 sachi sshd\[28696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.102.78 |
2019-09-09 02:01:30 |
106.12.56.218 | attackbots | Sep 8 11:09:07 server01 sshd\[8303\]: Invalid user 12345 from 106.12.56.218 Sep 8 11:09:07 server01 sshd\[8303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.218 Sep 8 11:09:10 server01 sshd\[8303\]: Failed password for invalid user 12345 from 106.12.56.218 port 46778 ssh2 ... |
2019-09-09 01:28:18 |
182.46.80.38 | attackspam | 23/tcp [2019-09-08]1pkt |
2019-09-09 02:00:40 |
106.75.65.162 | attack | Sep 8 11:13:43 saschabauer sshd[11689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.65.162 Sep 8 11:13:45 saschabauer sshd[11689]: Failed password for invalid user system from 106.75.65.162 port 50608 ssh2 |
2019-09-09 02:14:02 |
180.96.14.98 | attack | Sep 8 14:03:20 OPSO sshd\[29832\]: Invalid user bot1 from 180.96.14.98 port 2671 Sep 8 14:03:20 OPSO sshd\[29832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.14.98 Sep 8 14:03:23 OPSO sshd\[29832\]: Failed password for invalid user bot1 from 180.96.14.98 port 2671 ssh2 Sep 8 14:06:26 OPSO sshd\[30338\]: Invalid user test from 180.96.14.98 port 30973 Sep 8 14:06:26 OPSO sshd\[30338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.14.98 |
2019-09-09 01:57:06 |
98.156.148.239 | attackspambots | 2019-09-07 10:04:02 server sshd[52695]: Failed password for invalid user ftpuser from 98.156.148.239 port 35238 ssh2 |
2019-09-09 01:18:44 |
177.21.115.160 | attackspam | 8080/tcp [2019-09-08]1pkt |
2019-09-09 02:10:27 |
113.141.44.78 | attackspam | " " |
2019-09-09 01:45:48 |