City: unknown
Region: Ohio
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.48.99.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19226
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;158.48.99.85. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011602 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 17 12:27:35 CST 2025
;; MSG SIZE rcvd: 105
b'Host 85.99.48.158.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 158.48.99.85.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 188.3.74.117 | attackbots | " " |
2020-06-16 23:58:47 |
| 87.138.221.130 | attackbotsspam | 2020-06-16T15:25:57.676787homeassistant sshd[5784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.138.221.130 user=root 2020-06-16T15:26:00.269177homeassistant sshd[5784]: Failed password for root from 87.138.221.130 port 52660 ssh2 ... |
2020-06-16 23:58:01 |
| 200.40.45.82 | attackspambots | 2020-06-16T17:29:03.602005vps773228.ovh.net sshd[7239]: Failed password for root from 200.40.45.82 port 36950 ssh2 2020-06-16T17:34:39.196777vps773228.ovh.net sshd[7318]: Invalid user usuario from 200.40.45.82 port 49220 2020-06-16T17:34:39.212726vps773228.ovh.net sshd[7318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=r200-40-45-82.ae-static.anteldata.net.uy 2020-06-16T17:34:39.196777vps773228.ovh.net sshd[7318]: Invalid user usuario from 200.40.45.82 port 49220 2020-06-16T17:34:41.474769vps773228.ovh.net sshd[7318]: Failed password for invalid user usuario from 200.40.45.82 port 49220 ssh2 ... |
2020-06-16 23:40:54 |
| 213.184.249.95 | attack | Jun 16 14:14:53 ns382633 sshd\[30529\]: Invalid user raja from 213.184.249.95 port 34106 Jun 16 14:14:53 ns382633 sshd\[30529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.184.249.95 Jun 16 14:14:54 ns382633 sshd\[30529\]: Failed password for invalid user raja from 213.184.249.95 port 34106 ssh2 Jun 16 14:20:22 ns382633 sshd\[31771\]: Invalid user shop from 213.184.249.95 port 43198 Jun 16 14:20:22 ns382633 sshd\[31771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.184.249.95 |
2020-06-17 00:16:16 |
| 46.38.150.204 | attackbots | 757 times SMTP brute-force |
2020-06-16 23:53:16 |
| 122.117.65.129 | attack | Port probing on unauthorized port 23 |
2020-06-16 23:51:06 |
| 164.100.1.6 | attack | Portscan or hack attempt detected by psad/fwsnort |
2020-06-17 00:16:49 |
| 49.146.32.76 | attack | 1592310059 - 06/16/2020 14:20:59 Host: 49.146.32.76/49.146.32.76 Port: 445 TCP Blocked |
2020-06-16 23:52:01 |
| 159.89.236.71 | attack | Jun 16 16:34:54 mout sshd[9773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.236.71 user=root Jun 16 16:34:56 mout sshd[9773]: Failed password for root from 159.89.236.71 port 42392 ssh2 |
2020-06-16 23:43:48 |
| 51.254.143.190 | attack | Failed password for invalid user bol from 51.254.143.190 port 50011 ssh2 |
2020-06-16 23:57:12 |
| 45.10.24.238 | attackbots | Jun 16 12:20:36 firewall sshd[22781]: Invalid user admin from 45.10.24.238 Jun 16 12:20:38 firewall sshd[22781]: Failed password for invalid user admin from 45.10.24.238 port 44344 ssh2 Jun 16 12:23:59 firewall sshd[22832]: Invalid user aj from 45.10.24.238 ... |
2020-06-16 23:40:25 |
| 152.136.108.226 | attackspam | Jun 16 15:26:09 ns382633 sshd\[11638\]: Invalid user vaibhav from 152.136.108.226 port 51092 Jun 16 15:26:09 ns382633 sshd\[11638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.108.226 Jun 16 15:26:12 ns382633 sshd\[11638\]: Failed password for invalid user vaibhav from 152.136.108.226 port 51092 ssh2 Jun 16 15:34:28 ns382633 sshd\[12983\]: Invalid user arkserver from 152.136.108.226 port 49224 Jun 16 15:34:28 ns382633 sshd\[12983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.108.226 |
2020-06-17 00:06:41 |
| 200.89.174.209 | attack | Jun 16 17:45:23 home sshd[8267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.89.174.209 Jun 16 17:45:25 home sshd[8267]: Failed password for invalid user ttf from 200.89.174.209 port 34642 ssh2 Jun 16 17:46:49 home sshd[8403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.89.174.209 ... |
2020-06-17 00:04:12 |
| 74.82.47.53 | attackbotsspam | 1592310018 - 06/16/2020 19:20:18 Host: scan-12k.shadowserver.org/74.82.47.53 Port: 17 UDP Blocked ... |
2020-06-17 00:26:53 |
| 124.156.102.254 | attackbotsspam | 2020-06-16T07:38:16.937708server.mjenks.net sshd[1100777]: Failed password for invalid user monitor from 124.156.102.254 port 60562 ssh2 2020-06-16T07:42:51.311355server.mjenks.net sshd[1101354]: Invalid user ftp01 from 124.156.102.254 port 55906 2020-06-16T07:42:51.318598server.mjenks.net sshd[1101354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.102.254 2020-06-16T07:42:51.311355server.mjenks.net sshd[1101354]: Invalid user ftp01 from 124.156.102.254 port 55906 2020-06-16T07:42:53.459878server.mjenks.net sshd[1101354]: Failed password for invalid user ftp01 from 124.156.102.254 port 55906 ssh2 ... |
2020-06-17 00:10:45 |