City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.148.246.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55174
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;3.148.246.99. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 12:38:31 CST 2025
;; MSG SIZE rcvd: 105
99.246.148.3.in-addr.arpa domain name pointer ec2-3-148-246-99.us-east-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
99.246.148.3.in-addr.arpa name = ec2-3-148-246-99.us-east-2.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
107.170.63.221 | attack | Sep 9 05:56:22 lcdev sshd\[26719\]: Invalid user admin from 107.170.63.221 Sep 9 05:56:22 lcdev sshd\[26719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.63.221 Sep 9 05:56:23 lcdev sshd\[26719\]: Failed password for invalid user admin from 107.170.63.221 port 45912 ssh2 Sep 9 06:02:55 lcdev sshd\[27185\]: Invalid user nagios from 107.170.63.221 Sep 9 06:02:55 lcdev sshd\[27185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.63.221 |
2019-09-10 00:08:48 |
81.22.45.72 | attackbots | Unauthorized access on Port 22 [ssh] |
2019-09-10 00:26:36 |
222.210.0.82 | attackbots | Unauthorized connection attempt from IP address 222.210.0.82 on Port 445(SMB) |
2019-09-10 00:17:50 |
14.162.144.39 | attackbots | Unauthorized connection attempt from IP address 14.162.144.39 on Port 445(SMB) |
2019-09-10 00:31:22 |
189.125.93.8 | attackspam | Unauthorized connection attempt from IP address 189.125.93.8 on Port 445(SMB) |
2019-09-09 23:58:06 |
185.158.138.55 | attackspam | Unauthorized connection attempt from IP address 185.158.138.55 on Port 445(SMB) |
2019-09-09 23:18:31 |
79.170.44.137 | attack | Probing for vulnerable PHP code /wp-includes/Requests/Exception/Transport/mkkromvv.php |
2019-09-10 00:57:42 |
177.103.155.40 | attackbotsspam | Unauthorized connection attempt from IP address 177.103.155.40 on Port 445(SMB) |
2019-09-09 23:27:02 |
185.106.145.214 | attackbotsspam | 404 NOT FOUND |
2019-09-09 23:13:43 |
192.3.30.249 | attackspam | WordPress XMLRPC scan :: 192.3.30.249 0.232 BYPASS [10/Sep/2019:01:04:20 1000] www.[censored_1] "POST /xmlrpc.php HTTP/1.1" 200 382 "https://www.[censored_1]/" "PHP/7.3.05" |
2019-09-10 00:30:07 |
129.204.201.9 | attack | Sep 9 05:23:33 wbs sshd\[31079\]: Invalid user user1 from 129.204.201.9 Sep 9 05:23:33 wbs sshd\[31079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.201.9 Sep 9 05:23:36 wbs sshd\[31079\]: Failed password for invalid user user1 from 129.204.201.9 port 60900 ssh2 Sep 9 05:33:15 wbs sshd\[31981\]: Invalid user git from 129.204.201.9 Sep 9 05:33:15 wbs sshd\[31981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.201.9 |
2019-09-10 01:07:06 |
159.89.93.96 | attack | Wordpress Admin Login attack |
2019-09-10 01:00:03 |
92.53.65.96 | attackspam | Portscan or hack attempt detected by psad/fwsnort |
2019-09-10 00:30:52 |
197.156.104.113 | attackbotsspam | Unauthorized connection attempt from IP address 197.156.104.113 on Port 445(SMB) |
2019-09-09 23:48:30 |
218.92.0.208 | attackspambots | Sep 9 18:49:17 eventyay sshd[5289]: Failed password for root from 218.92.0.208 port 37022 ssh2 Sep 9 18:50:29 eventyay sshd[5316]: Failed password for root from 218.92.0.208 port 34397 ssh2 Sep 9 18:50:31 eventyay sshd[5316]: Failed password for root from 218.92.0.208 port 34397 ssh2 ... |
2019-09-10 00:58:59 |