City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.11.82.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61126
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;48.11.82.49. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400
;; Query time: 126 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 06:02:31 CST 2025
;; MSG SIZE rcvd: 104
Host 49.82.11.48.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 49.82.11.48.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 187.85.145.204 | attack | (smtpauth) Failed SMTP AUTH login from 187.85.145.204 (BR/Brazil/187-85-145-204.gegnet.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-07 16:31:59 plain authenticator failed for 187-85-145-204.gegnet.com.br [187.85.145.204]: 535 Incorrect authentication data (set_id=info) |
2020-08-08 02:28:46 |
| 107.170.91.121 | attackspam | Too many connections or unauthorized access detected from Arctic banned ip |
2020-08-08 02:41:45 |
| 49.206.51.33 | attackspambots | Unauthorized connection attempt from IP address 49.206.51.33 on Port 445(SMB) |
2020-08-08 02:45:03 |
| 103.140.105.62 | attack | Unauthorized connection attempt from IP address 103.140.105.62 on Port 445(SMB) |
2020-08-08 02:23:40 |
| 191.234.182.188 | attackspam | 2020-08-07T12:07:40.698451vps773228.ovh.net sshd[19640]: Invalid user ubuntu from 191.234.182.188 port 58140 2020-08-07T12:07:40.709141vps773228.ovh.net sshd[19640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.234.182.188 2020-08-07T12:07:40.698451vps773228.ovh.net sshd[19640]: Invalid user ubuntu from 191.234.182.188 port 58140 2020-08-07T12:07:42.802740vps773228.ovh.net sshd[19640]: Failed password for invalid user ubuntu from 191.234.182.188 port 58140 ssh2 2020-08-07T18:45:43.495147vps773228.ovh.net sshd[22410]: Invalid user postgres from 191.234.182.188 port 57088 ... |
2020-08-08 02:50:18 |
| 200.116.47.247 | attack | Aug 7 15:03:33 [host] sshd[7311]: Invalid user ab Aug 7 15:03:33 [host] sshd[7311]: pam_unix(sshd:a Aug 7 15:03:35 [host] sshd[7311]: Failed password |
2020-08-08 02:14:55 |
| 101.93.102.45 | attackspambots | Aug 3 03:35:49 liveconfig01 sshd[8495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.93.102.45 user=r.r Aug 3 03:35:51 liveconfig01 sshd[8495]: Failed password for r.r from 101.93.102.45 port 19131 ssh2 Aug 3 03:35:52 liveconfig01 sshd[8495]: Received disconnect from 101.93.102.45 port 19131:11: Bye Bye [preauth] Aug 3 03:35:52 liveconfig01 sshd[8495]: Disconnected from 101.93.102.45 port 19131 [preauth] Aug 3 03:51:15 liveconfig01 sshd[9055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.93.102.45 user=r.r Aug 3 03:51:17 liveconfig01 sshd[9055]: Failed password for r.r from 101.93.102.45 port 23062 ssh2 Aug 3 03:51:17 liveconfig01 sshd[9055]: Received disconnect from 101.93.102.45 port 23062:11: Bye Bye [preauth] Aug 3 03:51:17 liveconfig01 sshd[9055]: Disconnected from 101.93.102.45 port 23062 [preauth] Aug 3 03:56:09 liveconfig01 sshd[9212]: pam_unix(sshd:auth): au........ ------------------------------- |
2020-08-08 02:17:49 |
| 139.220.192.57 | attackspambots | SSH break in attempt ... |
2020-08-08 02:21:42 |
| 172.98.82.165 | attackbots | 2,64-01/02 [bc00/m27] PostRequest-Spammer scoring: nairobi |
2020-08-08 02:13:30 |
| 170.81.152.70 | attackspam | Unauthorized connection attempt from IP address 170.81.152.70 on Port 445(SMB) |
2020-08-08 02:42:34 |
| 66.249.70.59 | attack | SQL Injection |
2020-08-08 02:36:20 |
| 61.244.70.248 | attack | 61.244.70.248 - - [07/Aug/2020:14:01:36 +0200] "GET /wp-login.php HTTP/1.1" 200 5738 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 61.244.70.248 - - [07/Aug/2020:14:01:38 +0200] "POST /wp-login.php HTTP/1.1" 200 5989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 61.244.70.248 - - [07/Aug/2020:14:01:40 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-08-08 02:47:05 |
| 175.6.40.19 | attackbotsspam | 2020-08-07T14:10:55.209651amanda2.illicoweb.com sshd\[44696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.40.19 user=root 2020-08-07T14:10:57.176398amanda2.illicoweb.com sshd\[44696\]: Failed password for root from 175.6.40.19 port 42848 ssh2 2020-08-07T14:13:05.330898amanda2.illicoweb.com sshd\[45130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.40.19 user=root 2020-08-07T14:13:07.142360amanda2.illicoweb.com sshd\[45130\]: Failed password for root from 175.6.40.19 port 52224 ssh2 2020-08-07T14:17:42.638086amanda2.illicoweb.com sshd\[45898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.40.19 user=root ... |
2020-08-08 02:20:02 |
| 82.80.41.234 | attackbots | Unauthorized connection attempt from IP address 82.80.41.234 on Port 445(SMB) |
2020-08-08 02:15:41 |
| 168.61.72.51 | attackspam | Aug 7 15:45:15 ns382633 sshd\[8126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.72.51 user=root Aug 7 15:45:17 ns382633 sshd\[8126\]: Failed password for root from 168.61.72.51 port 45650 ssh2 Aug 7 16:11:12 ns382633 sshd\[13364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.72.51 user=root Aug 7 16:11:14 ns382633 sshd\[13364\]: Failed password for root from 168.61.72.51 port 53620 ssh2 Aug 7 16:38:05 ns382633 sshd\[17955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.72.51 user=root |
2020-08-08 02:48:28 |