City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.135.78.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59830
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;48.135.78.48. IN A
;; AUTHORITY SECTION:
. 266 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024100300 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 03 19:37:26 CST 2024
;; MSG SIZE rcvd: 105
Host 48.78.135.48.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 48.78.135.48.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 196.220.185.135 | attackspambots | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-11-30 18:41:03 |
| 91.137.140.242 | attack | 8291/tcp 8291/tcp 8291/tcp [2019-11-30]3pkt |
2019-11-30 18:36:10 |
| 106.12.208.27 | attackbots | Nov 30 11:40:13 localhost sshd\[6040\]: Invalid user guest from 106.12.208.27 port 53088 Nov 30 11:40:13 localhost sshd\[6040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.27 Nov 30 11:40:16 localhost sshd\[6040\]: Failed password for invalid user guest from 106.12.208.27 port 53088 ssh2 |
2019-11-30 18:47:09 |
| 35.240.232.17 | attackbots | xmlrpc attack |
2019-11-30 18:52:47 |
| 89.248.168.202 | attack | firewall-block, port(s): 4330/tcp, 4331/tcp, 4344/tcp, 4347/tcp, 4352/tcp, 4354/tcp, 4359/tcp |
2019-11-30 18:25:15 |
| 114.67.95.49 | attack | SSH bruteforce (Triggered fail2ban) |
2019-11-30 18:39:55 |
| 79.116.246.180 | attack | CloudCIX Reconnaissance Scan Detected, PTR: 79-116-246-180.dynamic.brasov.rdsnet.ro. |
2019-11-30 18:49:10 |
| 124.156.117.111 | attackspam | fail2ban |
2019-11-30 18:18:05 |
| 188.166.42.50 | attack | Nov 30 10:32:29 mail postfix/smtpd[29801]: warning: unknown[188.166.42.50]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 30 10:39:17 mail postfix/smtpd[31191]: warning: unknown[188.166.42.50]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 30 10:41:10 mail postfix/smtpd[31050]: warning: unknown[188.166.42.50]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-11-30 18:15:47 |
| 121.204.166.240 | attack | Nov 30 08:27:39 tux-35-217 sshd\[6966\]: Invalid user bbbbb from 121.204.166.240 port 59321 Nov 30 08:27:39 tux-35-217 sshd\[6966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.166.240 Nov 30 08:27:41 tux-35-217 sshd\[6966\]: Failed password for invalid user bbbbb from 121.204.166.240 port 59321 ssh2 Nov 30 08:31:29 tux-35-217 sshd\[6978\]: Invalid user abcdefghijklmnopq from 121.204.166.240 port 47002 Nov 30 08:31:29 tux-35-217 sshd\[6978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.166.240 ... |
2019-11-30 18:32:11 |
| 138.121.35.102 | attackspam | Lines containing failures of 138.121.35.102 Nov 30 08:07:08 home sshd[10077]: Invalid user test7 from 138.121.35.102 port 34744 Nov 30 08:07:08 home sshd[10077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.35.102 Nov 30 08:07:10 home sshd[10077]: Failed password for invalid user test7 from 138.121.35.102 port 34744 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=138.121.35.102 |
2019-11-30 18:20:58 |
| 71.19.250.131 | attack | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-11-30 18:35:14 |
| 114.221.13.110 | attackspambots | $f2bV_matches |
2019-11-30 18:16:34 |
| 45.143.221.26 | attackbots | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-11-30 18:53:27 |
| 103.129.98.170 | attackbots | Automatic report - Banned IP Access |
2019-11-30 18:19:09 |