City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.162.180.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 751
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.162.180.221. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 04:18:18 CST 2025
;; MSG SIZE rcvd: 108
b'Host 221.180.162.148.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 148.162.180.221.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
41.82.212.193 | attack | Automatic report - Banned IP Access |
2020-02-17 19:04:52 |
183.15.90.83 | attackspam | port scan and connect, tcp 23 (telnet) |
2020-02-17 18:38:00 |
132.255.54.6 | attackspambots | Fail2Ban - SSH Bruteforce Attempt |
2020-02-17 18:56:44 |
196.218.107.8 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-17 19:14:32 |
104.47.44.33 | attack | SSH login attempts. |
2020-02-17 18:52:06 |
104.47.4.33 | attackbotsspam | SSH login attempts. |
2020-02-17 18:46:30 |
14.241.66.55 | attackspam | Unauthorized connection attempt detected from IP address 14.241.66.55 to port 445 |
2020-02-17 18:36:49 |
189.234.168.142 | attack | Feb 16 23:23:56 auw2 sshd\[14669\]: Invalid user ubuntu from 189.234.168.142 Feb 16 23:23:56 auw2 sshd\[14669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.234.168.142 Feb 16 23:23:59 auw2 sshd\[14669\]: Failed password for invalid user ubuntu from 189.234.168.142 port 47062 ssh2 Feb 16 23:27:14 auw2 sshd\[14972\]: Invalid user vnc from 189.234.168.142 Feb 16 23:27:14 auw2 sshd\[14972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.234.168.142 |
2020-02-17 18:57:21 |
162.247.74.74 | attackspam | 02/17/2020-05:55:31.712551 162.247.74.74 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 15 |
2020-02-17 19:07:04 |
71.60.157.166 | attackspam | TCP Port Scanning |
2020-02-17 18:47:51 |
181.84.196.119 | attackbotsspam | Automatic report - Port Scan Attack |
2020-02-17 19:01:14 |
201.149.20.162 | attackbots | *Port Scan* detected from 201.149.20.162 (MX/Mexico/162.20.149.201.in-addr.arpa). 4 hits in the last 10 seconds |
2020-02-17 18:55:14 |
74.15.17.153 | attackbotsspam | Fail2Ban |
2020-02-17 19:08:41 |
196.218.133.21 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-17 18:43:42 |
185.27.121.125 | attack | SSH login attempts. |
2020-02-17 19:03:52 |