City: Milwaukee
Region: Wisconsin
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.8.243.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;148.8.243.192. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031601 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 17 13:28:05 CST 2025
;; MSG SIZE rcvd: 106
Host 192.243.8.148.in-addr.arpa not found: 2(SERVFAIL)
server can't find 148.8.243.192.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
58.230.147.230 | attackbots | $f2bV_matches |
2020-08-03 19:27:08 |
122.51.111.159 | attackbots | prod8 ... |
2020-08-03 19:52:29 |
1.6.103.18 | attackspambots | Aug 3 10:52:34 *** sshd[7909]: User root from 1.6.103.18 not allowed because not listed in AllowUsers |
2020-08-03 19:45:39 |
179.110.181.90 | attackspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-08-03 19:55:42 |
82.165.29.19 | attackbotsspam | Aug 3 13:17:56 db sshd[13330]: User root from 82.165.29.19 not allowed because none of user's groups are listed in AllowGroups ... |
2020-08-03 19:31:59 |
157.245.12.36 | attackspam | 2020-08-03T12:40:34.076214mail.broermann.family sshd[32181]: Failed password for root from 157.245.12.36 port 33090 ssh2 2020-08-03T12:44:29.231637mail.broermann.family sshd[32362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.12.36 user=root 2020-08-03T12:44:31.056205mail.broermann.family sshd[32362]: Failed password for root from 157.245.12.36 port 57772 ssh2 2020-08-03T12:48:09.346164mail.broermann.family sshd[32489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.12.36 user=root 2020-08-03T12:48:11.371515mail.broermann.family sshd[32489]: Failed password for root from 157.245.12.36 port 48868 ssh2 ... |
2020-08-03 19:27:34 |
2.179.66.19 | attackspam | Automatic report - Port Scan Attack |
2020-08-03 19:28:21 |
182.16.184.243 | attackbots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-08-03 19:33:28 |
191.242.246.207 | attackbots | Automatic report - Port Scan Attack |
2020-08-03 19:49:55 |
138.204.100.70 | attackspambots | Aug 2 18:23:05 cumulus sshd[17550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.100.70 user=r.r Aug 2 18:23:07 cumulus sshd[17550]: Failed password for r.r from 138.204.100.70 port 39970 ssh2 Aug 2 18:23:08 cumulus sshd[17550]: Received disconnect from 138.204.100.70 port 39970:11: Bye Bye [preauth] Aug 2 18:23:08 cumulus sshd[17550]: Disconnected from 138.204.100.70 port 39970 [preauth] Aug 2 18:38:05 cumulus sshd[18877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.100.70 user=r.r Aug 2 18:38:08 cumulus sshd[18877]: Failed password for r.r from 138.204.100.70 port 37940 ssh2 Aug 2 18:38:08 cumulus sshd[18877]: Received disconnect from 138.204.100.70 port 37940:11: Bye Bye [preauth] Aug 2 18:38:08 cumulus sshd[18877]: Disconnected from 138.204.100.70 port 37940 [preauth] Aug 2 18:42:17 cumulus sshd[19348]: pam_unix(sshd:auth): authentication failure; lognam........ ------------------------------- |
2020-08-03 19:42:36 |
82.64.15.106 | attackbots | Aug 2 22:53:31 web9 sshd\[26146\]: Invalid user pi from 82.64.15.106 Aug 2 22:53:31 web9 sshd\[26148\]: Invalid user pi from 82.64.15.106 Aug 2 22:53:31 web9 sshd\[26146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.15.106 Aug 2 22:53:31 web9 sshd\[26148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.15.106 Aug 2 22:53:33 web9 sshd\[26146\]: Failed password for invalid user pi from 82.64.15.106 port 48214 ssh2 |
2020-08-03 19:56:39 |
159.65.132.140 | attackspambots | Aug 03 04:51:31 askasleikir sshd[7101]: Failed password for root from 159.65.132.140 port 59376 ssh2 |
2020-08-03 19:39:55 |
119.45.6.43 | attackbots | Failed password for root from 119.45.6.43 port 37070 ssh2 |
2020-08-03 19:53:16 |
111.230.219.156 | attackspambots | 2020-08-02T23:18:05.5172121495-001 sshd[62706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.219.156 user=root 2020-08-02T23:18:07.3652951495-001 sshd[62706]: Failed password for root from 111.230.219.156 port 42882 ssh2 2020-08-02T23:22:48.9612261495-001 sshd[62882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.219.156 user=root 2020-08-02T23:22:51.3262991495-001 sshd[62882]: Failed password for root from 111.230.219.156 port 49066 ssh2 2020-08-02T23:27:34.5911311495-001 sshd[63094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.219.156 user=root 2020-08-02T23:27:36.2181721495-001 sshd[63094]: Failed password for root from 111.230.219.156 port 55264 ssh2 ... |
2020-08-03 19:50:11 |
87.251.74.181 | attack | Aug 3 13:09:29 debian-2gb-nbg1-2 kernel: \[18711440.646249\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.181 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=65466 PROTO=TCP SPT=58235 DPT=3919 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-08-03 19:25:11 |