City: unknown
Region: unknown
Country: Singapore
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.245.254.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;49.245.254.20. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 20:13:41 CST 2025
;; MSG SIZE rcvd: 106
20.254.245.49.in-addr.arpa domain name pointer 20.254.245.49.unknown.m1.com.sg.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
20.254.245.49.in-addr.arpa name = 20.254.245.49.unknown.m1.com.sg.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
171.244.145.251 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 12-03-2020 03:55:09. |
2020-03-12 13:38:38 |
185.176.27.250 | attackbotsspam | 03/12/2020-01:20:51.663965 185.176.27.250 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-12 13:32:55 |
104.250.34.72 | attackspambots | Mar 12 05:10:13 ns41 sshd[18994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.34.72 Mar 12 05:10:13 ns41 sshd[18994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.34.72 |
2020-03-12 14:03:28 |
35.240.164.224 | attack | $f2bV_matches |
2020-03-12 13:44:41 |
106.12.2.223 | attack | (sshd) Failed SSH login from 106.12.2.223 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 12 04:54:22 ubnt-55d23 sshd[26455]: Invalid user git from 106.12.2.223 port 43246 Mar 12 04:54:25 ubnt-55d23 sshd[26455]: Failed password for invalid user git from 106.12.2.223 port 43246 ssh2 |
2020-03-12 14:07:14 |
51.158.153.58 | attackspambots | $f2bV_matches |
2020-03-12 14:03:43 |
51.38.130.63 | attack | Invalid user ttest from 51.38.130.63 port 45730 |
2020-03-12 14:09:23 |
180.153.90.197 | attackspambots | Brute-force attempt banned |
2020-03-12 13:54:42 |
103.84.93.32 | attack | Mar 12 05:27:39 *** sshd[5055]: User root from 103.84.93.32 not allowed because not listed in AllowUsers |
2020-03-12 13:50:12 |
163.172.103.164 | attackbots | [portscan] Port scan |
2020-03-12 14:02:55 |
122.155.223.58 | attackspam | 21 attempts against mh-ssh on cloud |
2020-03-12 13:45:11 |
106.51.98.159 | attackspam | Too many connections or unauthorized access detected from Arctic banned ip |
2020-03-12 13:46:22 |
51.75.4.79 | attack | $f2bV_matches |
2020-03-12 13:38:52 |
124.108.21.100 | attack | SSH bruteforce (Triggered fail2ban) |
2020-03-12 13:55:32 |
106.13.86.199 | attackbots | SSH bruteforce (Triggered fail2ban) |
2020-03-12 14:04:12 |