City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.63.106.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;16.63.106.48. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 23:53:44 CST 2025
;; MSG SIZE rcvd: 105
48.106.63.16.in-addr.arpa domain name pointer ec2-16-63-106-48.eu-central-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
48.106.63.16.in-addr.arpa name = ec2-16-63-106-48.eu-central-2.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
94.66.221.183 | attack | Automatic report - Port Scan Attack |
2019-10-03 09:03:29 |
195.159.103.189 | attackbots | 2019-10-03T01:19:44.158978shield sshd\[21567\]: Invalid user log-in from 195.159.103.189 port 41020 2019-10-03T01:19:44.162527shield sshd\[21567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-159-103-189.customer.powertech.no 2019-10-03T01:19:46.539214shield sshd\[21567\]: Failed password for invalid user log-in from 195.159.103.189 port 41020 ssh2 2019-10-03T01:25:29.259740shield sshd\[22589\]: Invalid user raspberry from 195.159.103.189 port 54004 2019-10-03T01:25:29.264202shield sshd\[22589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-159-103-189.customer.powertech.no |
2019-10-03 09:29:17 |
58.1.134.41 | attackbots | Oct 2 14:57:06 php1 sshd\[32637\]: Invalid user norberto from 58.1.134.41 Oct 2 14:57:06 php1 sshd\[32637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.1.134.41 Oct 2 14:57:09 php1 sshd\[32637\]: Failed password for invalid user norberto from 58.1.134.41 port 52311 ssh2 Oct 2 15:01:44 php1 sshd\[612\]: Invalid user vy from 58.1.134.41 Oct 2 15:01:44 php1 sshd\[612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.1.134.41 |
2019-10-03 09:18:20 |
113.172.169.189 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/113.172.169.189/ VN - 1H : (356) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : VN NAME ASN : ASN45899 IP : 113.172.169.189 CIDR : 113.172.160.0/19 PREFIX COUNT : 2411 UNIQUE IP COUNT : 7209216 WYKRYTE ATAKI Z ASN45899 : 1H - 11 3H - 42 6H - 88 12H - 100 24H - 170 DateTime : 2019-10-02 23:24:01 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN - data recovery |
2019-10-03 09:35:09 |
222.186.42.4 | attackspam | SSH-BruteForce |
2019-10-03 09:21:05 |
37.187.79.55 | attackbotsspam | Oct 3 02:57:05 core sshd[17490]: Invalid user maddi from 37.187.79.55 port 41251 Oct 3 02:57:08 core sshd[17490]: Failed password for invalid user maddi from 37.187.79.55 port 41251 ssh2 ... |
2019-10-03 09:07:15 |
184.88.251.241 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/184.88.251.241/ US - 1H : (1405) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : US NAME ASN : ASN33363 IP : 184.88.251.241 CIDR : 184.88.0.0/14 PREFIX COUNT : 752 UNIQUE IP COUNT : 6006528 WYKRYTE ATAKI Z ASN33363 : 1H - 3 3H - 8 6H - 16 12H - 22 24H - 34 DateTime : 2019-10-02 23:24:01 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN - data recovery |
2019-10-03 09:36:44 |
37.59.37.69 | attackspam | 2019-10-02T21:57:11.194472abusebot-7.cloudsearch.cf sshd\[8113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns330008.ip-37-59-37.eu user=root |
2019-10-03 09:20:49 |
177.25.157.229 | attackspambots | Invalid user ubnt from 177.25.157.229 port 43837 |
2019-10-03 08:53:04 |
119.27.170.64 | attack | Oct 3 01:29:52 jane sshd[22662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.170.64 Oct 3 01:29:54 jane sshd[22662]: Failed password for invalid user 123postmaster from 119.27.170.64 port 44010 ssh2 ... |
2019-10-03 09:06:11 |
41.242.102.66 | attackspam | Oct 3 05:49:19 gw1 sshd[5424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.242.102.66 Oct 3 05:49:21 gw1 sshd[5424]: Failed password for invalid user teresa from 41.242.102.66 port 35782 ssh2 ... |
2019-10-03 09:04:59 |
123.20.167.25 | attack | Oct 2 23:24:13 dev sshd\[26863\]: Invalid user admin from 123.20.167.25 port 43698 Oct 2 23:24:13 dev sshd\[26863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.20.167.25 Oct 2 23:24:15 dev sshd\[26863\]: Failed password for invalid user admin from 123.20.167.25 port 43698 ssh2 |
2019-10-03 09:30:21 |
50.62.176.78 | attackbots | Automatic report - XMLRPC Attack |
2019-10-03 09:06:34 |
158.69.41.225 | attack | scan r |
2019-10-03 08:54:19 |
79.137.72.40 | attackbots | Oct 3 01:28:19 lnxded64 sshd[12246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.40 |
2019-10-03 09:05:19 |