City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.251.30.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23177
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.251.30.48. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 20:40:31 CST 2025
;; MSG SIZE rcvd: 106
48.30.251.148.in-addr.arpa domain name pointer static.48.30.251.148.clients.your-server.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
48.30.251.148.in-addr.arpa name = static.48.30.251.148.clients.your-server.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.13.237.235 | attack | Multiple SSH authentication failures from 106.13.237.235 |
2020-07-01 19:58:56 |
| 89.165.4.157 | attackspam | unauthorized connection attempt |
2020-07-01 19:44:40 |
| 139.59.146.28 | attackspam | 139.59.146.28 - - [30/Jun/2020:13:20:21 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.59.146.28 - - [30/Jun/2020:13:20:23 +0100] "POST /wp-login.php HTTP/1.1" 200 1924 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.59.146.28 - - [30/Jun/2020:13:20:24 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-07-01 19:38:26 |
| 116.228.37.90 | attackbotsspam |
|
2020-07-01 19:31:28 |
| 45.55.173.232 | attack | php WP PHPmyadamin ABUSE blocked for 12h |
2020-07-01 20:01:49 |
| 218.85.119.92 | attackbotsspam | Jun 30 11:46:04 propaganda sshd[14998]: Connection from 218.85.119.92 port 27264 on 10.0.0.160 port 22 rdomain "" Jun 30 11:46:05 propaganda sshd[14998]: Connection closed by 218.85.119.92 port 27264 [preauth] |
2020-07-01 20:13:41 |
| 113.254.161.18 | attack | Unauthorized connection attempt from IP address 113.254.161.18 on Port 445(SMB) |
2020-07-01 20:15:29 |
| 212.70.149.2 | attack | abuse-sasl |
2020-07-01 19:42:06 |
| 194.58.79.69 | attack | ... |
2020-07-01 20:14:36 |
| 192.241.223.31 | attackbotsspam | ZGrab Application Layer Scanner Detection |
2020-07-01 19:48:45 |
| 42.200.66.164 | attackspam | k+ssh-bruteforce |
2020-07-01 20:18:46 |
| 119.17.7.68 | attackspam |
|
2020-07-01 19:31:02 |
| 195.206.49.57 | attackspam | unauthorized connection attempt |
2020-07-01 20:19:33 |
| 223.113.74.54 | attack | pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.113.74.54 Invalid user log from 223.113.74.54 port 51762 Failed password for invalid user log from 223.113.74.54 port 51762 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.113.74.54 user=root Failed password for root from 223.113.74.54 port 58888 ssh2 |
2020-07-01 19:52:31 |
| 222.252.115.83 | attackbotsspam | Port scan on 1 port(s): 445 |
2020-07-01 20:21:58 |