City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.50.122.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;67.50.122.148. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400
;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 14:47:25 CST 2025
;; MSG SIZE rcvd: 106
148.122.50.67.in-addr.arpa has no PTR record
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
*** Can't find 148.122.50.67.in-addr.arpa.: No answer
Authoritative answers can be found from:
122.50.67.in-addr.arpa nameserver = auth01.roc.ny.frontiernet.net.
122.50.67.in-addr.arpa nameserver = auth.lkv.mn.frontiernet.net.
IP | Type | Details | Datetime |
---|---|---|---|
178.123.94.223 | attackspam | xmlrpc attack |
2020-08-02 06:18:05 |
194.204.194.11 | attackbots | Aug 2 00:44:33 journals sshd\[62571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11 user=root Aug 2 00:44:35 journals sshd\[62571\]: Failed password for root from 194.204.194.11 port 50666 ssh2 Aug 2 00:48:43 journals sshd\[62870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11 user=root Aug 2 00:48:45 journals sshd\[62870\]: Failed password for root from 194.204.194.11 port 35056 ssh2 Aug 2 00:52:55 journals sshd\[63129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.204.194.11 user=root ... |
2020-08-02 05:57:11 |
51.77.230.147 | attack | Aug 1 22:16:50 mail.srvfarm.net postfix/smtpd[1163188]: warning: vps-113fc0af.vps.ovh.net[51.77.230.147]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 1 22:16:50 mail.srvfarm.net postfix/smtpd[1163188]: lost connection after AUTH from vps-113fc0af.vps.ovh.net[51.77.230.147] Aug 1 22:16:54 mail.srvfarm.net postfix/smtpd[1163191]: warning: vps-113fc0af.vps.ovh.net[51.77.230.147]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 1 22:16:54 mail.srvfarm.net postfix/smtpd[1163190]: warning: vps-113fc0af.vps.ovh.net[51.77.230.147]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 1 22:16:54 mail.srvfarm.net postfix/smtpd[1163191]: lost connection after AUTH from vps-113fc0af.vps.ovh.net[51.77.230.147] Aug 1 22:16:54 mail.srvfarm.net postfix/smtpd[1163190]: lost connection after AUTH from vps-113fc0af.vps.ovh.net[51.77.230.147] |
2020-08-02 05:43:32 |
106.12.38.231 | attackspam | Aug 2 00:14:55 marvibiene sshd[24840]: Failed password for root from 106.12.38.231 port 44508 ssh2 Aug 2 00:16:46 marvibiene sshd[24914]: Failed password for root from 106.12.38.231 port 35604 ssh2 |
2020-08-02 06:18:42 |
45.4.252.4 | attack | 1596314880 - 08/02/2020 03:48:00 Host: ip-45-4-252-4.fibernet.net.ar/45.4.252.4 Port: 8080 TCP Blocked ... |
2020-08-02 06:16:53 |
106.12.200.239 | attack | Aug 1 23:39:20 vps647732 sshd[26676]: Failed password for root from 106.12.200.239 port 51628 ssh2 ... |
2020-08-02 05:49:05 |
195.154.53.178 | attack | WordPress brute force |
2020-08-02 06:10:25 |
178.46.210.43 | attackspambots | Port probing on unauthorized port 23 |
2020-08-02 06:16:31 |
45.136.7.12 | attackbotsspam | 2020-08-01 15:33:39.334698-0500 localhost smtpd[87353]: NOQUEUE: reject: RCPT from unknown[45.136.7.12]: 554 5.7.1 Service unavailable; Client host [45.136.7.12] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2020-08-02 06:06:27 |
45.136.7.13 | attack | 2020-08-01 15:41:21.572990-0500 localhost smtpd[87819]: NOQUEUE: reject: RCPT from unknown[45.136.7.13]: 554 5.7.1 Service unavailable; Client host [45.136.7.13] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= |
2020-08-02 06:04:51 |
125.94.149.72 | attackspambots | 20/8/1@16:48:15: FAIL: Alarm-Intrusion address from=125.94.149.72 ... |
2020-08-02 06:02:09 |
193.70.39.135 | attack | 2020-08-01T21:20:15.389753shield sshd\[9305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.ip-193-70-39.eu user=root 2020-08-01T21:20:17.238733shield sshd\[9305\]: Failed password for root from 193.70.39.135 port 60454 ssh2 2020-08-01T21:24:17.581438shield sshd\[10195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.ip-193-70-39.eu user=root 2020-08-01T21:24:19.988951shield sshd\[10195\]: Failed password for root from 193.70.39.135 port 44938 ssh2 2020-08-01T21:28:12.587429shield sshd\[11500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.ip-193-70-39.eu user=root |
2020-08-02 06:00:07 |
218.245.5.248 | attackbots | Repeated brute force against a port |
2020-08-02 05:57:26 |
222.186.175.183 | attackbots | Multiple SSH login attempts. |
2020-08-02 06:00:39 |
114.236.45.203 | attackspambots | Honeypot hit. |
2020-08-02 06:05:15 |