City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.64.64.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62792
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;244.64.64.78. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 09 23:52:17 CST 2025
;; MSG SIZE rcvd: 105
Host 78.64.64.244.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 78.64.64.244.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
190.217.97.138 | attack | 1586186978 - 04/06/2020 17:29:38 Host: 190.217.97.138/190.217.97.138 Port: 445 TCP Blocked |
2020-04-07 07:32:34 |
104.200.110.184 | attackspambots | SSH Brute-Forcing (server2) |
2020-04-07 07:11:58 |
114.119.164.214 | attackspam | IP: 114.119.164.214 Ports affected HTTP protocol over TLS/SSL (443) Abuse Confidence rating 15% Found in DNSBL('s) ASN Details AS136907 HUAWEI CLOUDS Singapore (SG) CIDR 114.119.160.0/21 Log Date: 6/04/2020 2:35:57 PM UTC |
2020-04-07 07:13:37 |
68.199.32.207 | attack | Port 22 Scan, PTR: None |
2020-04-07 07:32:06 |
190.26.134.156 | attackspam | Apr 6 19:17:46 m2 sshd[26091]: Invalid user pi from 190.26.134.156 Apr 6 19:17:46 m2 sshd[26090]: Invalid user pi from 190.26.134.156 Apr 6 19:17:49 m2 sshd[26090]: Failed password for invalid user pi from 190.26.134.156 port 38406 ssh2 Apr 6 19:17:49 m2 sshd[26091]: Failed password for invalid user pi from 190.26.134.156 port 38416 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=190.26.134.156 |
2020-04-07 07:44:01 |
51.178.93.110 | attackbots | *Port Scan* detected from 51.178.93.110 (FR/France/ns61232728.ip-51-178-93.eu). 11 hits in the last 85 seconds |
2020-04-07 07:12:30 |
60.53.167.237 | attackbotsspam | Triggered: repeated knocking on closed ports. |
2020-04-07 07:14:27 |
14.251.175.34 | attackbotsspam | Unauthorized connection attempt from IP address 14.251.175.34 on Port 445(SMB) |
2020-04-07 07:19:46 |
2.141.212.109 | attackspam | Automatic report - Port Scan Attack |
2020-04-07 07:15:36 |
49.88.112.111 | attack | Apr 7 04:18:42 gw1 sshd[23483]: Failed password for root from 49.88.112.111 port 32539 ssh2 ... |
2020-04-07 07:34:06 |
2.39.173.31 | attack | Scanning unused Default website or suspicious access to valid sites from IP marked as abusive |
2020-04-07 07:15:56 |
104.248.160.58 | attackbotsspam | SSH Brute-Forcing (server1) |
2020-04-07 07:40:29 |
117.50.44.123 | attack | Apr 6 17:29:47 [host] kernel: [2816317.324998] [U Apr 6 17:29:48 [host] kernel: [2816318.325391] [U Apr 6 17:29:48 [host] kernel: [2816318.352190] [U Apr 6 17:29:49 [host] kernel: [2816319.337294] [U Apr 6 17:29:49 [host] kernel: [2816319.354825] [U Apr 6 17:29:50 [host] kernel: [2816320.338800] [U |
2020-04-07 07:25:55 |
211.26.187.128 | attackspam | Apr 6 22:20:03 sshgateway sshd\[8960\]: Invalid user user from 211.26.187.128 Apr 6 22:20:03 sshgateway sshd\[8960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.187.26.211.sta.commander.net.au Apr 6 22:20:06 sshgateway sshd\[8960\]: Failed password for invalid user user from 211.26.187.128 port 39130 ssh2 |
2020-04-07 07:41:06 |
98.109.154.92 | attackbotsspam | Port 22 Scan, PTR: None |
2020-04-07 07:23:03 |