City: unknown
Region: unknown
Country: Norway
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.122.241.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14398
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.122.241.125. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 152 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 15:56:39 CST 2025
;; MSG SIZE rcvd: 108
Host 125.241.122.148.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 125.241.122.148.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
129.213.202.242 | attackbotsspam | Automatic report - Banned IP Access |
2019-11-15 21:49:51 |
79.171.118.226 | attackbots | [portscan] Port scan |
2019-11-15 21:44:27 |
189.59.48.229 | attackspambots | Nov 14 20:13:18 tdfoods sshd\[13923\]: Invalid user gxUPtel!\#\( from 189.59.48.229 Nov 14 20:13:18 tdfoods sshd\[13923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.59.48.229.dynamic.adsl.gvt.net.br Nov 14 20:13:20 tdfoods sshd\[13923\]: Failed password for invalid user gxUPtel!\#\( from 189.59.48.229 port 43504 ssh2 Nov 14 20:18:26 tdfoods sshd\[14347\]: Invalid user emelien from 189.59.48.229 Nov 14 20:18:26 tdfoods sshd\[14347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.59.48.229.dynamic.adsl.gvt.net.br |
2019-11-15 21:53:22 |
219.157.54.81 | attackbotsspam | Telnet/23 MH Probe, BF, Hack - |
2019-11-15 21:50:38 |
118.89.26.15 | attack | Nov 14 23:09:57 php1 sshd\[30993\]: Invalid user Satan from 118.89.26.15 Nov 14 23:09:57 php1 sshd\[30993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.26.15 Nov 14 23:10:00 php1 sshd\[30993\]: Failed password for invalid user Satan from 118.89.26.15 port 45422 ssh2 Nov 14 23:14:07 php1 sshd\[31302\]: Invalid user machalek from 118.89.26.15 Nov 14 23:14:07 php1 sshd\[31302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.26.15 |
2019-11-15 21:31:59 |
163.172.30.8 | attack | Lines containing failures of 163.172.30.8 Nov 14 10:40:12 majoron sshd[2729]: Invalid user saswata from 163.172.30.8 port 33535 Nov 14 10:40:12 majoron sshd[2729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.30.8 Nov 14 10:40:14 majoron sshd[2729]: Failed password for invalid user saswata from 163.172.30.8 port 33535 ssh2 Nov 14 10:40:14 majoron sshd[2729]: Received disconnect from 163.172.30.8 port 33535:11: Bye Bye [preauth] Nov 14 10:40:14 majoron sshd[2729]: Disconnected from invalid user saswata 163.172.30.8 port 33535 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=163.172.30.8 |
2019-11-15 21:51:13 |
77.247.110.173 | attack | *Port Scan* detected from 77.247.110.173 (NL/Netherlands/-). 4 hits in the last 240 seconds |
2019-11-15 22:06:10 |
210.12.134.242 | attackbots | Nov 15 12:32:53 www sshd\[54997\]: Invalid user hello from 210.12.134.242 Nov 15 12:32:53 www sshd\[54997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.12.134.242 Nov 15 12:32:55 www sshd\[54997\]: Failed password for invalid user hello from 210.12.134.242 port 46324 ssh2 ... |
2019-11-15 21:26:32 |
37.49.227.109 | attack | Portscan or hack attempt detected by psad/fwsnort |
2019-11-15 22:01:06 |
89.32.41.233 | attackbotsspam | Unauthorised access (Nov 15) SRC=89.32.41.233 LEN=40 TTL=51 ID=4621 TCP DPT=8080 WINDOW=20498 SYN Unauthorised access (Nov 15) SRC=89.32.41.233 LEN=40 TTL=51 ID=55885 TCP DPT=8080 WINDOW=20498 SYN Unauthorised access (Nov 14) SRC=89.32.41.233 LEN=40 TTL=51 ID=44552 TCP DPT=8080 WINDOW=20498 SYN Unauthorised access (Nov 14) SRC=89.32.41.233 LEN=40 TTL=51 ID=5886 TCP DPT=23 WINDOW=30778 SYN Unauthorised access (Nov 12) SRC=89.32.41.233 LEN=40 TTL=51 ID=10440 TCP DPT=8080 WINDOW=20498 SYN Unauthorised access (Nov 11) SRC=89.32.41.233 LEN=40 TTL=51 ID=51976 TCP DPT=8080 WINDOW=20498 SYN |
2019-11-15 21:37:37 |
120.92.153.47 | attack | v+mailserver-auth-bruteforce |
2019-11-15 21:31:07 |
88.255.108.20 | attackspambots | Unauthorised access (Nov 15) SRC=88.255.108.20 LEN=52 TTL=108 ID=1913 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-15 21:45:01 |
180.76.151.113 | attackbotsspam | $f2bV_matches |
2019-11-15 21:29:00 |
106.75.165.187 | attackspam | Invalid user wwwadmin from 106.75.165.187 port 47076 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.165.187 Failed password for invalid user wwwadmin from 106.75.165.187 port 47076 ssh2 Invalid user jw from 106.75.165.187 port 53292 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.165.187 |
2019-11-15 22:00:07 |
95.167.39.12 | attackbotsspam | Nov 15 12:21:12 ns382633 sshd\[27267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.39.12 user=root Nov 15 12:21:14 ns382633 sshd\[27267\]: Failed password for root from 95.167.39.12 port 51756 ssh2 Nov 15 12:29:28 ns382633 sshd\[28463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.39.12 user=root Nov 15 12:29:29 ns382633 sshd\[28463\]: Failed password for root from 95.167.39.12 port 55804 ssh2 Nov 15 12:32:56 ns382633 sshd\[29153\]: Invalid user annar from 95.167.39.12 port 35832 Nov 15 12:32:56 ns382633 sshd\[29153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.39.12 |
2019-11-15 21:50:06 |