City: Lubbock
Region: Texas
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.48.231.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57588
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.48.231.49. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030702 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 13:25:35 CST 2025
;; MSG SIZE rcvd: 106
Host 49.231.48.216.in-addr.arpa not found: 2(SERVFAIL)
b'
Authoritative answers can be found from:
'
IP | Type | Details | Datetime |
---|---|---|---|
106.13.232.184 | attackspam | ssh brute force |
2020-04-13 06:58:33 |
120.233.171.6 | attackbotsspam | port |
2020-04-13 07:17:01 |
222.186.173.201 | attack | detected by Fail2Ban |
2020-04-13 07:24:01 |
139.59.169.103 | attack | Apr 13 01:03:42 host01 sshd[27330]: Failed password for root from 139.59.169.103 port 34488 ssh2 Apr 13 01:06:58 host01 sshd[27947]: Failed password for root from 139.59.169.103 port 41430 ssh2 ... |
2020-04-13 07:21:09 |
222.186.175.217 | attackspam | 04/12/2020-19:10:32.909621 222.186.175.217 Protocol: 6 ET SCAN Potential SSH Scan |
2020-04-13 07:18:21 |
77.65.79.150 | attack | SSH invalid-user multiple login try |
2020-04-13 07:17:28 |
67.205.154.203 | attackbots | ssh brute force |
2020-04-13 06:59:59 |
154.66.107.43 | attackbotsspam | Apr 12 21:29:24 marvibiene sshd[4390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.66.107.43 user=root Apr 12 21:29:26 marvibiene sshd[4390]: Failed password for root from 154.66.107.43 port 44560 ssh2 Apr 12 21:30:32 marvibiene sshd[4398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.66.107.43 user=root Apr 12 21:30:35 marvibiene sshd[4398]: Failed password for root from 154.66.107.43 port 58202 ssh2 ... |
2020-04-13 07:15:08 |
185.181.8.240 | attackspam | Attempted connection to port 22. |
2020-04-13 07:10:02 |
134.175.73.93 | attackspambots | SASL PLAIN auth failed: ruser=... |
2020-04-13 06:55:03 |
106.75.100.18 | attackbotsspam | ssh brute force |
2020-04-13 06:57:26 |
50.255.64.233 | attackspambots | Fail2Ban Ban Triggered |
2020-04-13 06:54:45 |
176.105.255.186 | attack | " " |
2020-04-13 07:32:12 |
61.228.116.2 | attackbotsspam | 445/tcp 445/tcp 445/tcp [2020-04-10]3pkt |
2020-04-13 07:26:08 |
82.135.27.20 | attack | SSH Brute-Forcing (server1) |
2020-04-13 07:26:57 |