City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.159.138.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13632
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.159.138.85. IN A
;; AUTHORITY SECTION:
. 139 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 26 00:46:41 CST 2022
;; MSG SIZE rcvd: 107
85.138.159.104.in-addr.arpa domain name pointer 104-159-138-085.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
85.138.159.104.in-addr.arpa name = 104-159-138-085.res.spectrum.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
89.210.5.110 | attack | Telnet Server BruteForce Attack |
2019-06-26 09:39:29 |
131.0.63.50 | attackspambots | 19/6/25@13:09:46: FAIL: Alarm-Intrusion address from=131.0.63.50 ... |
2019-06-26 09:02:51 |
198.144.176.123 | attackspam | (From SimonNash966@hotmail.com) Hi there If you've been struggling to get more clients open to new ideas, I'm here to help you out. If you've been dreaming of a beautiful and business efficient website that can generate a massive amount of profit, I'll help you get that. I'm a freelance web designer who's been helping many businesses grow in the past 10 years. I'm all about flexibility and I'm sure we can work something out with your budget. I'd love to share more information about my services during a free consultation. I'm pretty sure you've got a lot of questions for me too, so please write back to let me know when you're free to be contacted. I look forward to speaking with you. Simon Nash |
2019-06-26 09:43:29 |
60.22.217.211 | attackbots | Unauthorised access (Jun 25) SRC=60.22.217.211 LEN=40 TTL=49 ID=58381 TCP DPT=23 WINDOW=56429 SYN |
2019-06-26 09:32:29 |
221.179.103.2 | attack | SSH-BruteForce |
2019-06-26 08:57:15 |
203.115.136.43 | attackspambots | Unauthorized connection attempt from IP address 203.115.136.43 on Port 445(SMB) |
2019-06-26 08:56:45 |
207.148.120.58 | attackspam | Invalid user tor from 207.148.120.58 port 43313 |
2019-06-26 09:05:18 |
46.36.105.19 | attackspam | Trying to deliver email spam, but blocked by RBL |
2019-06-26 09:05:44 |
213.74.204.74 | attack | Honeypot hit. |
2019-06-26 09:12:44 |
92.119.160.40 | attackspam | 26.06.2019 01:10:33 Connection to port 3309 blocked by firewall |
2019-06-26 09:18:48 |
168.232.18.2 | attackspambots | Jun 25 23:21:42 [host] sshd[506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.18.2 user=root Jun 25 23:21:45 [host] sshd[506]: Failed password for root from 168.232.18.2 port 53922 ssh2 Jun 25 23:23:42 [host] sshd[532]: Invalid user deploy from 168.232.18.2 Jun 25 23:23:42 [host] sshd[532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.18.2 |
2019-06-26 09:15:49 |
103.90.224.226 | attackbotsspam | 445/tcp 445/tcp 445/tcp [2019-06-12/25]3pkt |
2019-06-26 09:21:14 |
80.93.210.82 | attack | Unauthorized connection attempt from IP address 80.93.210.82 on Port 445(SMB) |
2019-06-26 09:29:09 |
103.213.245.50 | attack | Jun 25 19:09:46 ns37 sshd[8032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.213.245.50 |
2019-06-26 09:03:20 |
80.82.78.13 | attackspambots | RDP_Brute_Force |
2019-06-26 09:31:33 |