City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 248.120.18.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4701
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;248.120.18.53. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 19:42:26 CST 2025
;; MSG SIZE rcvd: 106
Host 53.18.120.248.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 53.18.120.248.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.186.15.101 | attackbots | Fail2Ban Ban Triggered |
2019-09-28 16:22:21 |
| 120.92.172.196 | attack | Sep 28 10:56:07 tuotantolaitos sshd[12349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.172.196 Sep 28 10:56:09 tuotantolaitos sshd[12349]: Failed password for invalid user akima from 120.92.172.196 port 56280 ssh2 ... |
2019-09-28 16:08:32 |
| 153.36.236.35 | attackspambots | Sep 28 03:58:21 plusreed sshd[16542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.35 user=root Sep 28 03:58:23 plusreed sshd[16542]: Failed password for root from 153.36.236.35 port 23031 ssh2 ... |
2019-09-28 16:02:06 |
| 119.187.26.36 | attack | Sep 28 09:52:25 vps01 sshd[25478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.187.26.36 Sep 28 09:52:27 vps01 sshd[25478]: Failed password for invalid user mario from 119.187.26.36 port 42610 ssh2 |
2019-09-28 16:31:59 |
| 106.12.54.182 | attack | Sep 28 03:51:51 www_kotimaassa_fi sshd[29157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.54.182 Sep 28 03:51:53 www_kotimaassa_fi sshd[29157]: Failed password for invalid user aleon from 106.12.54.182 port 55936 ssh2 ... |
2019-09-28 15:58:23 |
| 40.126.245.83 | attack | 2375/tcp 6380/tcp 6379/tcp... [2019-08-14/09-27]6pkt,3pt.(tcp) |
2019-09-28 16:07:41 |
| 81.30.212.14 | attackspambots | Sep 28 09:46:39 tux-35-217 sshd\[6359\]: Invalid user avendoria from 81.30.212.14 port 56416 Sep 28 09:46:39 tux-35-217 sshd\[6359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.212.14 Sep 28 09:46:40 tux-35-217 sshd\[6359\]: Failed password for invalid user avendoria from 81.30.212.14 port 56416 ssh2 Sep 28 09:51:05 tux-35-217 sshd\[6361\]: Invalid user pete from 81.30.212.14 port 39452 Sep 28 09:51:05 tux-35-217 sshd\[6361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.212.14 ... |
2019-09-28 15:55:45 |
| 142.4.204.122 | attackbots | Sep 28 07:07:23 www2 sshd\[27551\]: Invalid user oracle from 142.4.204.122Sep 28 07:07:25 www2 sshd\[27551\]: Failed password for invalid user oracle from 142.4.204.122 port 38761 ssh2Sep 28 07:11:21 www2 sshd\[28044\]: Invalid user zw from 142.4.204.122 ... |
2019-09-28 15:56:52 |
| 80.95.44.9 | attackbots | /ucp.php?mode=register&sid=164199e5a6397aae47e24e3a39e8f941 |
2019-09-28 15:47:55 |
| 119.183.78.172 | attackbotsspam | firewall-block, port(s): 22/tcp |
2019-09-28 16:26:08 |
| 117.93.105.75 | attack | (Sep 28) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=61165 TCP DPT=8080 WINDOW=56748 SYN (Sep 27) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=49114 TCP DPT=8080 WINDOW=40897 SYN (Sep 27) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=18715 TCP DPT=8080 WINDOW=40897 SYN (Sep 27) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=13774 TCP DPT=8080 WINDOW=9274 SYN (Sep 27) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=51243 TCP DPT=8080 WINDOW=502 SYN (Sep 26) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=1517 TCP DPT=8080 WINDOW=20807 SYN (Sep 26) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=64159 TCP DPT=8080 WINDOW=20807 SYN (Sep 26) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=45528 TCP DPT=8080 WINDOW=56748 SYN (Sep 26) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=59689 TCP DPT=8080 WINDOW=20807 SYN (Sep 25) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=52375 TCP DPT=8080 WINDOW=40897 SYN (Sep 24) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=45596 TCP DPT=8080 WINDOW=28066 SYN (Sep 24) LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=22981 TCP DPT=8080 WINDOW=28066 S... |
2019-09-28 16:19:31 |
| 115.236.100.114 | attack | Sep 28 09:30:06 dedicated sshd[27728]: Invalid user nmrsu from 115.236.100.114 port 43563 |
2019-09-28 15:49:37 |
| 110.49.71.242 | attackbots | Sep 28 04:53:54 icinga sshd[17751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.71.242 Sep 28 04:53:56 icinga sshd[17751]: Failed password for invalid user attack from 110.49.71.242 port 51235 ssh2 Sep 28 05:51:55 icinga sshd[54320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.71.242 ... |
2019-09-28 15:54:06 |
| 140.143.183.71 | attack | Sep 27 22:07:58 web1 sshd\[9512\]: Invalid user support from 140.143.183.71 Sep 27 22:07:58 web1 sshd\[9512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.183.71 Sep 27 22:08:00 web1 sshd\[9512\]: Failed password for invalid user support from 140.143.183.71 port 60696 ssh2 Sep 27 22:11:33 web1 sshd\[9895\]: Invalid user rtcservice from 140.143.183.71 Sep 27 22:11:33 web1 sshd\[9895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.183.71 |
2019-09-28 16:15:49 |
| 79.137.84.144 | attack | Sep 27 19:52:16 sachi sshd\[1503\]: Invalid user fluffy from 79.137.84.144 Sep 27 19:52:16 sachi sshd\[1503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.ip-79-137-84.eu Sep 27 19:52:18 sachi sshd\[1503\]: Failed password for invalid user fluffy from 79.137.84.144 port 49742 ssh2 Sep 27 19:56:46 sachi sshd\[1865\]: Invalid user sl from 79.137.84.144 Sep 27 19:56:46 sachi sshd\[1865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.ip-79-137-84.eu |
2019-09-28 16:25:36 |