City: Coram
Region: New York
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: SUNY at Stony Brook
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.49.2.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29510
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;129.49.2.45. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019052100 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 22 01:07:46 CST 2019
;; MSG SIZE rcvd: 115
45.2.49.129.in-addr.arpa domain name pointer joesws1.cc.stonybrook.edu.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
45.2.49.129.in-addr.arpa name = joesws1.cc.stonybrook.edu.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.110.95.6 | attackspambots | 5x Failed Password |
2020-06-16 19:37:59 |
| 197.234.193.46 | attackbotsspam | Invalid user user5 from 197.234.193.46 port 49022 |
2020-06-16 19:16:05 |
| 106.54.9.63 | attackbotsspam | Fail2Ban - SSH Bruteforce Attempt |
2020-06-16 19:29:41 |
| 58.27.99.112 | attackbotsspam | 20 attempts against mh-ssh on cloud |
2020-06-16 19:05:00 |
| 116.236.251.214 | attack | Invalid user ts3ovh from 116.236.251.214 port 26868 |
2020-06-16 19:02:04 |
| 103.5.6.37 | attackbotsspam | Unauthorized connection attempt detected from IP address 103.5.6.37 to port 445 |
2020-06-16 19:00:09 |
| 123.18.182.120 | attackbotsspam | 20/6/15@23:48:06: FAIL: Alarm-Network address from=123.18.182.120 ... |
2020-06-16 19:11:33 |
| 119.96.157.188 | attackbotsspam | Jun 16 12:34:43 vpn01 sshd[26510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.157.188 Jun 16 12:34:46 vpn01 sshd[26510]: Failed password for invalid user pbsdata from 119.96.157.188 port 59408 ssh2 ... |
2020-06-16 19:16:50 |
| 71.6.233.228 | attack |
|
2020-06-16 19:24:05 |
| 129.204.250.129 | attackbotsspam | $f2bV_matches |
2020-06-16 19:27:27 |
| 89.134.126.89 | attackspambots | odoo8 ... |
2020-06-16 19:36:15 |
| 110.164.180.211 | attack | Brute-force attempt banned |
2020-06-16 19:17:12 |
| 167.71.172.167 | attack | $f2bV_matches |
2020-06-16 19:33:28 |
| 218.92.0.223 | attack | Jun 16 13:04:21 v22018053744266470 sshd[10577]: Failed password for root from 218.92.0.223 port 62009 ssh2 Jun 16 13:04:31 v22018053744266470 sshd[10590]: Failed password for root from 218.92.0.223 port 54253 ssh2 ... |
2020-06-16 19:05:48 |
| 49.83.230.226 | attackspam | SSH/22 MH Probe, BF, Hack - |
2020-06-16 19:19:12 |