City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.7.113.223
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48839
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;49.7.113.223. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:03:23 CST 2025
;; MSG SIZE rcvd: 105
Host 223.113.7.49.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 223.113.7.49.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 213.82.114.206 | attack | fail2ban |
2020-03-31 17:15:31 |
| 157.245.83.211 | attackspam | 03/31/2020-01:18:29.847860 157.245.83.211 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-31 16:28:00 |
| 94.102.52.57 | attackbotsspam | 03/31/2020-04:18:20.698053 94.102.52.57 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-31 16:36:27 |
| 89.248.168.202 | attackspam | 03/31/2020-03:54:47.603113 89.248.168.202 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-03-31 17:00:34 |
| 198.108.67.89 | attack | Port scan: Attack repeated for 24 hours |
2020-03-31 16:49:00 |
| 45.141.84.17 | attackspambots | Mar 31 10:17:22 debian-2gb-nbg1-2 kernel: \[7901696.535792\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.141.84.17 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=63495 PROTO=TCP SPT=55171 DPT=9068 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-31 16:46:42 |
| 146.88.240.128 | attackspambots | 03/31/2020-04:13:50.256969 146.88.240.128 Protocol: 17 ET DROP Dshield Block Listed Source group 1 |
2020-03-31 16:28:44 |
| 172.105.89.161 | attack | [portscan] tcp/21 [FTP] *(RWIN=1024)(03311119) |
2020-03-31 16:55:36 |
| 2601:589:4480:a5a0:7dd7:9a45:d088:7653 | attack | IP address logged by my Netflix account after the individual hacked into and locked me out of my account. Individual also changed my account settings to the most expensive plan, which allows multiple people (profiles) to watch, and several profiles were added. The name on my account was changed to "Juan". I contacted Netflix to have my account restored, so I was able to see the various IP addresses used. I will report all of them as well. |
2020-03-31 17:14:40 |
| 89.248.172.85 | attackbotsspam | 03/31/2020-03:29:11.476796 89.248.172.85 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-03-31 16:59:58 |
| 66.240.219.146 | attackbots | Unauthorized connection attempt detected from IP address 66.240.219.146 to port 8050 |
2020-03-31 16:44:37 |
| 94.102.56.215 | attackbots | 94.102.56.215 was recorded 22 times by 12 hosts attempting to connect to the following ports: 2049,2152. Incident counter (4h, 24h, all-time): 22, 133, 9331 |
2020-03-31 16:56:40 |
| 120.52.121.86 | attackspam | " " |
2020-03-31 16:32:57 |
| 178.128.83.204 | attackbotsspam | SSH Brute-Force reported by Fail2Ban |
2020-03-31 16:19:26 |
| 51.68.174.177 | attackspam | Invalid user fly from 51.68.174.177 port 53708 |
2020-03-31 17:08:49 |