City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.254.2.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26996
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;16.254.2.248. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 23:12:50 CST 2025
;; MSG SIZE rcvd: 105
Host 248.2.254.16.in-addr.arpa not found: 2(SERVFAIL)
server can't find 16.254.2.248.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 23.90.145.42 | attack | *Port Scan* detected from 23.90.145.42 (DE/Germany/Hesse/Frankfurt am Main/-). 4 hits in the last 155 seconds |
2020-08-16 21:56:11 |
| 93.51.29.92 | attackbots | Aug 16 16:22:45 abendstille sshd\[9800\]: Invalid user gfs from 93.51.29.92 Aug 16 16:22:45 abendstille sshd\[9800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.51.29.92 Aug 16 16:22:47 abendstille sshd\[9800\]: Failed password for invalid user gfs from 93.51.29.92 port 33716 ssh2 Aug 16 16:23:53 abendstille sshd\[11132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.51.29.92 user=stefan Aug 16 16:23:54 abendstille sshd\[11132\]: Failed password for stefan from 93.51.29.92 port 42620 ssh2 ... |
2020-08-16 22:25:13 |
| 124.160.83.138 | attackbotsspam | SSH Brute Force |
2020-08-16 22:05:38 |
| 210.112.232.6 | attackbotsspam | Aug 16 08:07:36 r.ca sshd[31386]: Failed password for invalid user xum from 210.112.232.6 port 49976 ssh2 |
2020-08-16 22:25:42 |
| 222.186.175.215 | attackspambots | Aug 16 15:59:22 melroy-server sshd[26620]: Failed password for root from 222.186.175.215 port 53736 ssh2 ... |
2020-08-16 22:17:16 |
| 212.252.106.196 | attack | Aug 16 16:08:02 home sshd[300400]: Failed password for root from 212.252.106.196 port 58058 ssh2 Aug 16 16:12:12 home sshd[302653]: Invalid user admin1 from 212.252.106.196 port 34601 Aug 16 16:12:12 home sshd[302653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.252.106.196 Aug 16 16:12:12 home sshd[302653]: Invalid user admin1 from 212.252.106.196 port 34601 Aug 16 16:12:15 home sshd[302653]: Failed password for invalid user admin1 from 212.252.106.196 port 34601 ssh2 ... |
2020-08-16 22:13:47 |
| 123.150.9.163 | attack | Aug 16 12:29:30 mx01 sshd[9351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.150.9.163 user=mysql Aug 16 12:29:32 mx01 sshd[9351]: Failed password for mysql from 123.150.9.163 port 1984 ssh2 Aug 16 12:29:32 mx01 sshd[9351]: Received disconnect from 123.150.9.163: 11: Bye Bye [preauth] Aug 16 12:34:15 mx01 sshd[10033]: Invalid user llq from 123.150.9.163 Aug 16 12:34:15 mx01 sshd[10033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.150.9.163 Aug 16 12:34:17 mx01 sshd[10033]: Failed password for invalid user llq from 123.150.9.163 port 26872 ssh2 Aug 16 12:34:17 mx01 sshd[10033]: Received disconnect from 123.150.9.163: 11: Bye Bye [preauth] Aug 16 12:36:15 mx01 sshd[10344]: Invalid user test_user from 123.150.9.163 Aug 16 12:36:15 mx01 sshd[10344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.150.9.163 Aug 16 12:36:17 mx01 sshd[1........ ------------------------------- |
2020-08-16 21:52:04 |
| 94.128.213.185 | attackbots | Aug 16 12:43:39 ip-172-31-16-56 sshd\[13526\]: Invalid user lk from 94.128.213.185\ Aug 16 12:43:41 ip-172-31-16-56 sshd\[13526\]: Failed password for invalid user lk from 94.128.213.185 port 35196 ssh2\ Aug 16 12:48:31 ip-172-31-16-56 sshd\[13555\]: Invalid user bdos from 94.128.213.185\ Aug 16 12:48:33 ip-172-31-16-56 sshd\[13555\]: Failed password for invalid user bdos from 94.128.213.185 port 35197 ssh2\ Aug 16 12:53:29 ip-172-31-16-56 sshd\[13603\]: Invalid user admin from 94.128.213.185\ |
2020-08-16 22:04:13 |
| 59.125.160.248 | attackspam | Aug 16 08:10:08 r.ca sshd[31432]: Failed password for invalid user iptv from 59.125.160.248 port 53475 ssh2 |
2020-08-16 22:21:30 |
| 45.129.33.141 | attackspambots | Port scan on 12 port(s): 37014 37019 37034 37040 37053 37069 37912 37945 37972 38841 38846 38883 |
2020-08-16 22:31:42 |
| 178.128.125.10 | attack | 2020-08-16T14:41:57.965109cyberdyne sshd[1639489]: Invalid user odoo from 178.128.125.10 port 63975 2020-08-16T14:41:57.971318cyberdyne sshd[1639489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.125.10 2020-08-16T14:41:57.965109cyberdyne sshd[1639489]: Invalid user odoo from 178.128.125.10 port 63975 2020-08-16T14:42:00.495111cyberdyne sshd[1639489]: Failed password for invalid user odoo from 178.128.125.10 port 63975 ssh2 ... |
2020-08-16 22:27:05 |
| 117.86.124.36 | attackspam | Fail2Ban Ban Triggered |
2020-08-16 22:26:21 |
| 198.100.149.77 | attack | 198.100.149.77 - - [16/Aug/2020:13:24:51 +0100] "POST /wp-login.php HTTP/1.1" 200 2345 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 198.100.149.77 - - [16/Aug/2020:13:24:52 +0100] "POST /wp-login.php HTTP/1.1" 200 2350 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 198.100.149.77 - - [16/Aug/2020:13:24:53 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-16 22:18:33 |
| 218.54.123.239 | attackspam | Failed password for invalid user mailserver from 218.54.123.239 port 52134 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.54.123.239 user=root Failed password for root from 218.54.123.239 port 60494 ssh2 pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.54.123.239 user=root Failed password for root from 218.54.123.239 port 40498 ssh2 |
2020-08-16 22:09:28 |
| 67.209.185.218 | attackspam | Aug 16 15:50:37 buvik sshd[22555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.209.185.218 Aug 16 15:50:39 buvik sshd[22555]: Failed password for invalid user ts3srv from 67.209.185.218 port 54082 ssh2 Aug 16 15:54:56 buvik sshd[23190]: Invalid user newuser1 from 67.209.185.218 ... |
2020-08-16 22:10:36 |