City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.129.244.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10175
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;254.129.244.248. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 10:42:23 CST 2025
;; MSG SIZE rcvd: 108
Host 248.244.129.254.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 248.244.129.254.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 197.240.226.60 | attack | Unauthorized connection attempt from IP address 197.240.226.60 on Port 445(SMB) |
2020-08-17 07:54:49 |
| 106.13.44.100 | attack | 2020-08-16T23:19:23.714653randservbullet-proofcloud-66.localdomain sshd[25320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.44.100 user=root 2020-08-16T23:19:25.747090randservbullet-proofcloud-66.localdomain sshd[25320]: Failed password for root from 106.13.44.100 port 53758 ssh2 2020-08-16T23:34:08.715531randservbullet-proofcloud-66.localdomain sshd[25362]: Invalid user carlos from 106.13.44.100 port 48512 ... |
2020-08-17 07:52:56 |
| 191.7.145.246 | attack | Aug 16 20:24:13 ns3033917 sshd[28038]: Failed password for invalid user lyj from 191.7.145.246 port 59166 ssh2 Aug 16 20:30:22 ns3033917 sshd[28132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.7.145.246 user=root Aug 16 20:30:24 ns3033917 sshd[28132]: Failed password for root from 191.7.145.246 port 56370 ssh2 ... |
2020-08-17 08:11:13 |
| 80.53.156.62 | attackbots | DATE:2020-08-17 00:47:15,IP:80.53.156.62,MATCHES:10,PORT:ssh |
2020-08-17 07:51:45 |
| 92.50.239.94 | attack | Unauthorized connection attempt from IP address 92.50.239.94 on Port 445(SMB) |
2020-08-17 07:56:31 |
| 78.138.188.187 | attack | Aug 17 00:16:58 xeon sshd[22938]: Failed password for invalid user sftpuser from 78.138.188.187 port 45094 ssh2 |
2020-08-17 07:56:57 |
| 185.94.213.54 | attack | Unauthorized connection attempt from IP address 185.94.213.54 on Port 445(SMB) |
2020-08-17 08:09:46 |
| 140.238.25.151 | attackbotsspam | Aug 16 20:47:42 plex-server sshd[2256425]: Invalid user fuckyou from 140.238.25.151 port 55618 Aug 16 20:47:42 plex-server sshd[2256425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.238.25.151 Aug 16 20:47:42 plex-server sshd[2256425]: Invalid user fuckyou from 140.238.25.151 port 55618 Aug 16 20:47:44 plex-server sshd[2256425]: Failed password for invalid user fuckyou from 140.238.25.151 port 55618 ssh2 Aug 16 20:51:58 plex-server sshd[2258203]: Invalid user publish from 140.238.25.151 port 36598 ... |
2020-08-17 07:43:01 |
| 117.208.51.74 | attackbotsspam | Unauthorized connection attempt from IP address 117.208.51.74 on Port 445(SMB) |
2020-08-17 07:58:36 |
| 91.122.219.36 | attackbotsspam | [portscan] Port scan |
2020-08-17 08:19:04 |
| 118.24.149.248 | attack | Aug 17 03:27:15 gw1 sshd[18845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.149.248 Aug 17 03:27:16 gw1 sshd[18845]: Failed password for invalid user kel from 118.24.149.248 port 40930 ssh2 ... |
2020-08-17 08:03:03 |
| 52.72.87.162 | attackbots | Email rejected due to spam filtering |
2020-08-17 08:15:14 |
| 103.87.76.242 | attack | Unauthorized connection attempt from IP address 103.87.76.242 on Port 445(SMB) |
2020-08-17 07:51:21 |
| 116.206.153.139 | attackbotsspam | Unauthorized connection attempt from IP address 116.206.153.139 on Port 445(SMB) |
2020-08-17 07:46:19 |
| 54.221.124.123 | attack | Email rejected due to spam filtering |
2020-08-17 08:19:28 |