City: unknown
Region: unknown
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.75.205.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31908
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;12.75.205.142. IN A
;; AUTHORITY SECTION:
. 232 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020011100 1800 900 604800 86400
;; Query time: 121 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 04:33:48 CST 2020
;; MSG SIZE rcvd: 117
142.205.75.12.in-addr.arpa domain name pointer 142.newark-07rh15rt.nj.dial-access.att.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.205.75.12.in-addr.arpa name = 142.newark-07rh15rt.nj.dial-access.att.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
71.6.199.23 | attack | 12/02/2019-19:34:21.021049 71.6.199.23 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71 |
2019-12-03 04:21:41 |
14.242.143.254 | attackspambots | SpamReport |
2019-12-03 04:20:41 |
125.141.139.9 | attackbots | SSH bruteforce (Triggered fail2ban) |
2019-12-03 04:09:17 |
170.210.214.50 | attackbotsspam | leo_www |
2019-12-03 03:53:37 |
1.238.117.37 | attackspambots | SpamReport |
2019-12-03 04:25:10 |
197.210.29.149 | attackbotsspam | Unauthorized connection attempt from IP address 197.210.29.149 on Port 445(SMB) |
2019-12-03 03:55:04 |
190.124.31.218 | attackbotsspam | SpamReport |
2019-12-03 04:08:31 |
185.206.173.228 | attack | SpamReport |
2019-12-03 04:12:11 |
104.244.75.244 | attackspam | 2019-12-02T19:59:08.568574abusebot-8.cloudsearch.cf sshd\[8747\]: Invalid user team2 from 104.244.75.244 port 54892 |
2019-12-03 04:09:59 |
5.228.207.234 | attackbotsspam | Dec 2 20:02:23 hcbbdb sshd\[17553\]: Invalid user ubuntu from 5.228.207.234 Dec 2 20:02:23 hcbbdb sshd\[17553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-5-228-207-234.ip.moscow.rt.ru Dec 2 20:02:25 hcbbdb sshd\[17553\]: Failed password for invalid user ubuntu from 5.228.207.234 port 60614 ssh2 Dec 2 20:08:30 hcbbdb sshd\[18308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-5-228-207-234.ip.moscow.rt.ru user=root Dec 2 20:08:32 hcbbdb sshd\[18308\]: Failed password for root from 5.228.207.234 port 41948 ssh2 |
2019-12-03 04:16:31 |
112.85.42.227 | attackspam | Dec 2 14:48:03 TORMINT sshd\[16954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227 user=root Dec 2 14:48:05 TORMINT sshd\[16954\]: Failed password for root from 112.85.42.227 port 12074 ssh2 Dec 2 14:54:28 TORMINT sshd\[17485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227 user=root ... |
2019-12-03 04:11:43 |
36.84.65.65 | attackspambots | Unauthorized connection attempt from IP address 36.84.65.65 on Port 445(SMB) |
2019-12-03 04:07:57 |
168.232.129.158 | attackbotsspam | SpamReport |
2019-12-03 04:15:34 |
160.153.154.5 | attack | Automatic report - XMLRPC Attack |
2019-12-03 03:59:59 |
222.120.192.114 | attackbotsspam | Automatic report - Banned IP Access |
2019-12-03 04:12:45 |