City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.148.51.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;44.148.51.57. IN A
;; AUTHORITY SECTION:
. 33 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 17:48:41 CST 2022
;; MSG SIZE rcvd: 105
b'Host 57.51.148.44.in-addr.arpa. not found: 3(NXDOMAIN)
'
server can't find 44.148.51.57.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
187.1.160.254 | attack | Wordpress attack |
2020-08-11 22:40:46 |
222.186.180.142 | attackspam | Aug 11 16:46:42 eventyay sshd[12106]: Failed password for root from 222.186.180.142 port 51463 ssh2 Aug 11 16:46:56 eventyay sshd[12111]: Failed password for root from 222.186.180.142 port 11492 ssh2 Aug 11 16:46:58 eventyay sshd[12111]: Failed password for root from 222.186.180.142 port 11492 ssh2 ... |
2020-08-11 22:51:06 |
192.35.168.173 | attackbots | Port Scan/VNC login attempt ... |
2020-08-11 22:32:22 |
2400:6180:100:d0::95a:e001 | attackspambots | xmlrpc attack |
2020-08-11 22:56:06 |
123.207.157.120 | attackspam | SSH Bruteforce |
2020-08-11 22:20:19 |
202.185.32.126 | attackspambots | 1597147891 - 08/11/2020 14:11:31 Host: 202.185.32.126/202.185.32.126 Port: 445 TCP Blocked |
2020-08-11 22:57:09 |
162.243.237.90 | attackspambots | Aug 11 15:22:22 plg sshd[14606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.237.90 user=root Aug 11 15:22:24 plg sshd[14606]: Failed password for invalid user root from 162.243.237.90 port 53696 ssh2 Aug 11 15:25:28 plg sshd[14647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.237.90 user=root Aug 11 15:25:29 plg sshd[14647]: Failed password for invalid user root from 162.243.237.90 port 52077 ssh2 Aug 11 15:28:31 plg sshd[14686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.237.90 user=root Aug 11 15:28:32 plg sshd[14686]: Failed password for invalid user root from 162.243.237.90 port 50465 ssh2 ... |
2020-08-11 22:42:42 |
148.66.142.174 | attackspambots | Aug 11 15:42:57 b-vps wordpress(gpfans.cz)[30596]: Authentication attempt for unknown user buchtic from 148.66.142.174 ... |
2020-08-11 22:56:38 |
13.67.110.14 | attack | 13.67.110.14 - - - [11/Aug/2020:14:21:17 +0200] "GET /.env HTTP/1.1" 404 564 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" "-" "-" |
2020-08-11 22:17:50 |
182.61.1.248 | attackspam | Aug 11 14:11:37 kh-dev-server sshd[21272]: Failed password for root from 182.61.1.248 port 48180 ssh2 ... |
2020-08-11 22:52:04 |
187.155.209.200 | attackspambots | Aug 11 16:03:20 cosmoit sshd[27340]: Failed password for root from 187.155.209.200 port 60048 ssh2 |
2020-08-11 22:22:42 |
193.112.126.64 | attackspam | Aug 11 15:13:43 ip40 sshd[26038]: Failed password for root from 193.112.126.64 port 52592 ssh2 ... |
2020-08-11 22:23:00 |
218.92.0.249 | attackbotsspam | Aug 11 10:25:15 NPSTNNYC01T sshd[27885]: Failed password for root from 218.92.0.249 port 59745 ssh2 Aug 11 10:25:18 NPSTNNYC01T sshd[27885]: Failed password for root from 218.92.0.249 port 59745 ssh2 Aug 11 10:25:22 NPSTNNYC01T sshd[27885]: Failed password for root from 218.92.0.249 port 59745 ssh2 Aug 11 10:25:29 NPSTNNYC01T sshd[27885]: error: maximum authentication attempts exceeded for root from 218.92.0.249 port 59745 ssh2 [preauth] ... |
2020-08-11 22:37:45 |
176.119.28.196 | attackspam | GET /.git/config |
2020-08-11 22:17:33 |
5.44.169.215 | attackspam | 0,72-07/37 [bc14/m122] PostRequest-Spammer scoring: essen |
2020-08-11 22:19:21 |