City: Los Angeles
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.159.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32691
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.149.159.74. IN A
;; AUTHORITY SECTION:
. 590 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022040702 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 08 02:15:27 CST 2022
;; MSG SIZE rcvd: 107
74.159.149.104.in-addr.arpa domain name pointer qctrainingonline.com.
74.159.149.104.in-addr.arpa domain name pointer rentairsoft.com.
74.159.149.104.in-addr.arpa domain name pointer thermawoodtech.com.
74.159.149.104.in-addr.arpa domain name pointer tiemannbuildingservices.com.
74.159.149.104.in-addr.arpa domain name pointer timberframeguy.com.
74.159.149.104.in-addr.arpa domain name pointer ascendaviationllc.com.
74.159.149.104.in-addr.arpa domain name pointer buildistics.com.
74.159.149.104.in-addr.arpa domain name pointer charityhvac.com.
74.159.149.104.in-addr.arpa domain name pointer devowe.com.
74.159.149.104.in-addr.arpa domain name pointer diyicf.com.
74.159.149.104.in-addr.arpa domain name pointer diysuspensionbridge.com.
74.159.149.104.in-addr.arpa domain name pointer diytowrope.com.
74.159.149.104.in-addr.arpa domain name pointer firefighterdrivertraining.com.
74.159.149.104.in-addr.arpa domain name pointer hardigrade.com.
74.159.149.104.in-addr.arpa domain name pointer heirloomproducts.com.
74.15
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
74.159.149.104.in-addr.arpa name = thermawoodtech.com.
74.159.149.104.in-addr.arpa name = tiemannbuildingservices.com.
74.159.149.104.in-addr.arpa name = timberframeguy.com.
74.159.149.104.in-addr.arpa name = ascendaviationllc.com.
74.159.149.104.in-addr.arpa name = buildistics.com.
74.159.149.104.in-addr.arpa name = charityhvac.com.
74.159.149.104.in-addr.arpa name = devowe.com.
74.159.149.104.in-addr.arpa name = diyicf.com.
74.159.149.104.in-addr.arpa name = diysuspensionbridge.com.
74.159.149.104.in-addr.arpa name = diytowrope.com.
74.159.149.104.in-addr.arpa name = firefighterdrivertraining.com.
74.159.149.104.in-addr.arpa name = hardigrade.com.
74.159.149.104.in-addr.arpa name = heirloomproducts.com.
74.159.149.104.in-addr.arpa name = hk-website.com.
74.159.149.104.in-addr.arpa name = ianzvi.com.
74.159.149.104.in-addr.arpa name = jamesdevowe.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
185.41.187.164 | attackbotsspam | Portscan or hack attempt detected by psad/fwsnort |
2019-12-15 19:42:43 |
121.66.252.158 | attack | Dec 14 22:47:18 home sshd[28788]: Invalid user toong from 121.66.252.158 port 34280 Dec 14 22:47:18 home sshd[28788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.252.158 Dec 14 22:47:18 home sshd[28788]: Invalid user toong from 121.66.252.158 port 34280 Dec 14 22:47:20 home sshd[28788]: Failed password for invalid user toong from 121.66.252.158 port 34280 ssh2 Dec 14 23:02:25 home sshd[28926]: Invalid user torusjoe from 121.66.252.158 port 53734 Dec 14 23:02:25 home sshd[28926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.252.158 Dec 14 23:02:25 home sshd[28926]: Invalid user torusjoe from 121.66.252.158 port 53734 Dec 14 23:02:27 home sshd[28926]: Failed password for invalid user torusjoe from 121.66.252.158 port 53734 ssh2 Dec 14 23:09:46 home sshd[28977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.66.252.158 user=root Dec 14 23:09:48 home sshd[28977]: Faile |
2019-12-15 20:11:05 |
47.74.245.7 | attackbots | Dec 15 01:20:03 kapalua sshd\[20592\]: Invalid user gro from 47.74.245.7 Dec 15 01:20:03 kapalua sshd\[20592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.245.7 Dec 15 01:20:04 kapalua sshd\[20592\]: Failed password for invalid user gro from 47.74.245.7 port 35672 ssh2 Dec 15 01:29:41 kapalua sshd\[21384\]: Invalid user password from 47.74.245.7 Dec 15 01:29:41 kapalua sshd\[21384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.245.7 |
2019-12-15 19:49:48 |
223.72.38.230 | attack | Scanning |
2019-12-15 20:20:41 |
54.39.145.31 | attackspambots | 2019-12-15T07:18:48.543811struts4.enskede.local sshd\[20048\]: Invalid user geschaft from 54.39.145.31 port 34554 2019-12-15T07:18:48.552573struts4.enskede.local sshd\[20048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.ip-54-39-145.net 2019-12-15T07:18:51.393729struts4.enskede.local sshd\[20048\]: Failed password for invalid user geschaft from 54.39.145.31 port 34554 ssh2 2019-12-15T07:23:52.157384struts4.enskede.local sshd\[20073\]: Invalid user souheil from 54.39.145.31 port 42508 2019-12-15T07:23:52.164006struts4.enskede.local sshd\[20073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.ip-54-39-145.net ... |
2019-12-15 20:09:48 |
179.242.52.51 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-15 20:03:36 |
91.143.201.190 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2019-12-15 19:45:35 |
191.240.103.211 | attack | Honeypot attack, port: 81, PTR: 191-240-103-211.mcl-fb.mastercabo.com.br. |
2019-12-15 19:48:41 |
175.138.108.78 | attackbots | Dec 15 12:30:25 vps647732 sshd[29217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.108.78 Dec 15 12:30:28 vps647732 sshd[29217]: Failed password for invalid user euro from 175.138.108.78 port 42954 ssh2 ... |
2019-12-15 19:47:13 |
185.142.236.35 | attackspambots | scan z |
2019-12-15 20:08:52 |
136.228.163.98 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-15 20:18:51 |
39.105.208.39 | attack | Dec 15 05:53:58 host sshd\[7166\]: Invalid user bot from 39.105.208.39Dec 15 06:01:07 host sshd\[10534\]: Invalid user ta from 39.105.208.39Dec 15 06:08:13 host sshd\[14359\]: Invalid user debian-exim from 39.105.208.39 ... |
2019-12-15 19:58:21 |
222.186.175.155 | attackspam | Dec 15 13:01:53 host sshd[32495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155 user=root Dec 15 13:01:55 host sshd[32495]: Failed password for root from 222.186.175.155 port 18996 ssh2 ... |
2019-12-15 20:07:12 |
192.144.142.72 | attack | Dec 15 12:07:02 h2177944 sshd\[18679\]: Invalid user kristianse from 192.144.142.72 port 42879 Dec 15 12:07:02 h2177944 sshd\[18679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.142.72 Dec 15 12:07:04 h2177944 sshd\[18679\]: Failed password for invalid user kristianse from 192.144.142.72 port 42879 ssh2 Dec 15 12:14:12 h2177944 sshd\[18927\]: Invalid user shianhan from 192.144.142.72 port 41490 ... |
2019-12-15 19:57:14 |
149.56.131.73 | attackbots | Dec 15 12:57:43 gw1 sshd[7403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.131.73 Dec 15 12:57:45 gw1 sshd[7403]: Failed password for invalid user roseth from 149.56.131.73 port 41100 ssh2 ... |
2019-12-15 20:14:43 |