City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.93.239.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58879
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;8.93.239.50. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 18:00:05 CST 2025
;; MSG SIZE rcvd: 104
Host 50.239.93.8.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 50.239.93.8.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 82.98.168.104 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 72 - port: 3389 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-13 05:01:20 |
| 74.120.14.16 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 64 - port: 1194 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-13 05:02:43 |
| 89.248.172.140 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 7110 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-13 04:58:27 |
| 222.78.4.102 | attackspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 66 |
2020-10-13 04:52:36 |
| 176.126.175.90 | attackspambots | ET POLICY DNS Update From External net - port: 53 proto: udp cat: Potential Corporate Privacy Violationbytes: 60 |
2020-10-13 04:50:28 |
| 106.54.141.45 | attackspam | Oct 12 17:18:32 *hidden* sshd[41629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.45 user=root Oct 12 17:18:34 *hidden* sshd[41629]: Failed password for *hidden* from 106.54.141.45 port 49454 ssh2 Oct 12 17:22:47 *hidden* sshd[45925]: Invalid user erno from 106.54.141.45 port 39760 |
2020-10-13 04:40:16 |
| 129.226.148.10 | attack | IP blocked |
2020-10-13 04:44:31 |
| 117.51.150.202 | attack | 2020-10-12T15:50:24.888402morrigan.ad5gb.com sshd[717532]: Invalid user user from 117.51.150.202 port 38038 |
2020-10-13 05:12:28 |
| 201.208.234.162 | attackspam | Port scan on 1 port(s): 445 |
2020-10-13 04:53:41 |
| 218.245.5.248 | attack | 2020-10-12T10:37:52.661424yoshi.linuxbox.ninja sshd[3171265]: Invalid user nut from 218.245.5.248 port 63184 2020-10-12T10:37:54.808026yoshi.linuxbox.ninja sshd[3171265]: Failed password for invalid user nut from 218.245.5.248 port 63184 ssh2 2020-10-12T10:40:59.538645yoshi.linuxbox.ninja sshd[3173336]: Invalid user tomcat from 218.245.5.248 port 35013 ... |
2020-10-13 04:41:20 |
| 94.102.51.28 | attackbotsspam | Oct 12 22:53:57 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=94.102.51.28 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=50790 PROTO=TCP SPT=46594 DPT=45355 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 12 22:58:36 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=94.102.51.28 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=4168 PROTO=TCP SPT=46594 DPT=47667 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 12 23:01:47 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=94.102.51.28 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=40976 PROTO=TCP SPT=46594 DPT=13886 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 12 23:08:05 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=94.102.51.28 DST=173.212.244.83 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=34845 PROTO=TCP SPT=46594 DPT=29762 WINDOW=1024 RES=0x00 SYN URGP=0 Oct 12 23:09:15 *hidd ... |
2020-10-13 05:13:37 |
| 142.93.193.63 | attack | 142.93.193.63 - - [12/Oct/2020:22:49:59 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.193.63 - - [12/Oct/2020:22:50:00 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.193.63 - - [12/Oct/2020:22:50:01 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-10-13 05:11:14 |
| 45.129.33.80 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 5027 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-13 05:05:35 |
| 109.69.67.17 | attackspam | Tor exit node as of 11.10.20 |
2020-10-13 04:49:23 |
| 74.120.14.75 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 65 - port: 12456 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-13 05:01:59 |