City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.68.70.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10307
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;48.68.70.252. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 18:52:01 CST 2025
;; MSG SIZE rcvd: 105
Host 252.70.68.48.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 252.70.68.48.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 50.126.109.226 | attack | SMB Server BruteForce Attack |
2020-09-14 04:46:58 |
| 49.233.54.98 | attackspambots | Brute-force attempt banned |
2020-09-14 04:47:14 |
| 81.147.185.11 | attack | Automatic report - Banned IP Access |
2020-09-14 04:52:47 |
| 120.53.123.153 | attackspambots | Sep 13 20:05:31 mout sshd[7843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.123.153 user=root Sep 13 20:05:33 mout sshd[7843]: Failed password for root from 120.53.123.153 port 51214 ssh2 |
2020-09-14 05:05:03 |
| 218.56.160.82 | attackspam | Sep 13 21:12:54 minden010 sshd[31744]: Failed password for root from 218.56.160.82 port 34073 ssh2 Sep 13 21:17:08 minden010 sshd[825]: Failed password for root from 218.56.160.82 port 10836 ssh2 ... |
2020-09-14 04:39:45 |
| 35.226.252.36 | attack | 35.226.252.36 (US/United States/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 13 12:58:33 server5 sshd[28629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.89.214 user=root Sep 13 12:56:05 server5 sshd[27533]: Failed password for root from 51.83.97.44 port 38070 ssh2 Sep 13 12:57:18 server5 sshd[27960]: Failed password for root from 35.226.252.36 port 48176 ssh2 Sep 13 12:58:55 server5 sshd[28762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.49.7 user=root Sep 13 12:58:36 server5 sshd[28629]: Failed password for root from 159.65.89.214 port 39400 ssh2 IP Addresses Blocked: 159.65.89.214 (GB/United Kingdom/-) 51.83.97.44 (FR/France/-) |
2020-09-14 04:55:24 |
| 106.13.36.10 | attackbots | (sshd) Failed SSH login from 106.13.36.10 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 13 16:14:00 optimus sshd[29428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.36.10 user=root Sep 13 16:14:01 optimus sshd[29428]: Failed password for root from 106.13.36.10 port 39542 ssh2 Sep 13 16:14:15 optimus sshd[29553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.36.10 user=root Sep 13 16:14:17 optimus sshd[29553]: Failed password for root from 106.13.36.10 port 48570 ssh2 Sep 13 16:19:46 optimus sshd[31342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.36.10 user=root |
2020-09-14 04:43:45 |
| 222.186.180.6 | attackbotsspam | Sep 13 22:50:00 ucs sshd\[8266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6 user=root Sep 13 22:50:02 ucs sshd\[8263\]: error: PAM: User not known to the underlying authentication module for root from 222.186.180.6 Sep 13 22:50:03 ucs sshd\[8313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6 user=root ... |
2020-09-14 04:53:17 |
| 191.33.135.120 | attackbots | php WP PHPmyadamin ABUSE blocked for 12h |
2020-09-14 04:56:10 |
| 104.244.78.136 | attack | Sep 13 20:04:39 XXX sshd[60692]: Invalid user cablecom from 104.244.78.136 port 34760 |
2020-09-14 05:07:37 |
| 212.145.192.205 | attackbotsspam | Sep 13 22:51:16 fhem-rasp sshd[16861]: Failed password for root from 212.145.192.205 port 47216 ssh2 Sep 13 22:51:16 fhem-rasp sshd[16861]: Disconnected from authenticating user root 212.145.192.205 port 47216 [preauth] ... |
2020-09-14 04:55:38 |
| 203.192.219.7 | attack | "fail2ban match" |
2020-09-14 05:11:52 |
| 106.75.141.160 | attack | SSH Brute-Force Attack |
2020-09-14 04:59:22 |
| 222.186.175.148 | attackspam | 2020-09-13T23:46:21.797913afi-git.jinr.ru sshd[28134]: Failed password for root from 222.186.175.148 port 52648 ssh2 2020-09-13T23:46:25.181666afi-git.jinr.ru sshd[28134]: Failed password for root from 222.186.175.148 port 52648 ssh2 2020-09-13T23:46:28.309044afi-git.jinr.ru sshd[28134]: Failed password for root from 222.186.175.148 port 52648 ssh2 2020-09-13T23:46:28.309172afi-git.jinr.ru sshd[28134]: error: maximum authentication attempts exceeded for root from 222.186.175.148 port 52648 ssh2 [preauth] 2020-09-13T23:46:28.309186afi-git.jinr.ru sshd[28134]: Disconnecting: Too many authentication failures [preauth] ... |
2020-09-14 04:50:06 |
| 111.229.199.239 | attack | SSH Brute-Forcing (server1) |
2020-09-14 04:54:16 |