City: Chico
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.241.74.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;132.241.74.27. IN A
;; AUTHORITY SECTION:
. 535 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019092400 1800 900 604800 86400
;; Query time: 397 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 25 01:55:47 CST 2019
;; MSG SIZE rcvd: 117
27.74.241.132.in-addr.arpa domain name pointer holt185a-prt-74-27.CSUChico.EDU.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
27.74.241.132.in-addr.arpa name = holt185a-prt-74-27.CSUChico.EDU.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
222.186.190.92 | attackspam | Nov 11 01:26:44 MK-Soft-Root2 sshd[3217]: Failed password for root from 222.186.190.92 port 29606 ssh2 Nov 11 01:26:49 MK-Soft-Root2 sshd[3217]: Failed password for root from 222.186.190.92 port 29606 ssh2 ... |
2019-11-11 08:30:13 |
198.108.67.79 | attackspambots | 198.108.67.79 was recorded 5 times by 5 hosts attempting to connect to the following ports: 3109,9029,2111,8000,8190. Incident counter (4h, 24h, all-time): 5, 12, 84 |
2019-11-11 08:12:23 |
125.70.111.182 | attackspambots | Unauthorised access (Nov 11) SRC=125.70.111.182 LEN=44 TTL=240 ID=59821 TCP DPT=1433 WINDOW=1024 SYN |
2019-11-11 08:14:33 |
89.189.128.13 | attack | Unauthorized connection attempt from IP address 89.189.128.13 on Port 445(SMB) |
2019-11-11 08:24:31 |
111.59.93.76 | attack | 2019-11-11T01:00:56.0761051240 sshd\[9230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.59.93.76 user=root 2019-11-11T01:00:58.0975871240 sshd\[9230\]: Failed password for root from 111.59.93.76 port 58667 ssh2 2019-11-11T01:01:00.9884721240 sshd\[9232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.59.93.76 user=root ... |
2019-11-11 08:10:04 |
85.106.141.222 | attackbotsspam | firewall-block, port(s): 23/tcp |
2019-11-11 08:41:27 |
91.123.204.139 | attackspambots | Masscan Port Scanning Tool Detection |
2019-11-11 08:40:11 |
185.238.137.218 | attackbotsspam | Unauthorized connection attempt from IP address 185.238.137.218 on Port 445(SMB) |
2019-11-11 08:08:20 |
149.56.89.123 | attackbots | Nov 11 00:52:35 SilenceServices sshd[19904]: Failed password for root from 149.56.89.123 port 52380 ssh2 Nov 11 01:00:55 SilenceServices sshd[25376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.89.123 Nov 11 01:00:58 SilenceServices sshd[25376]: Failed password for invalid user rensink from 149.56.89.123 port 42392 ssh2 |
2019-11-11 08:12:41 |
188.136.162.45 | attack | Netgear DGN Device Remote Command Execution Vulnerability |
2019-11-11 08:42:13 |
222.246.37.113 | attackbots | FTP/21 MH Probe, BF, Hack - |
2019-11-11 08:07:48 |
110.232.87.115 | attackspam | Unauthorized connection attempt from IP address 110.232.87.115 on Port 445(SMB) |
2019-11-11 08:21:13 |
104.254.92.54 | attackspambots | (From gabriel.scholl@gmail.com) Hi, Do you want to reach new clients? We are personally inviting you to sign up with one of the leading influencer and affiliate networks on the web. This network finds influencers and affiliates in your niche who will promote your company on their websites and social network channels. Advantages of our program include: brand name recognition for your company, increased trustworthiness, and possibly more clients. It's the safest, easiest and most effective way to increase your sales! What do you think? Visit: http://www.advertisewithinfluencers.site |
2019-11-11 08:28:00 |
190.97.252.94 | attackspam | Unauthorized connection attempt from IP address 190.97.252.94 on Port 445(SMB) |
2019-11-11 08:15:45 |
123.207.140.248 | attackbotsspam | Nov 10 14:14:28 hpm sshd\[4066\]: Invalid user pgsql from 123.207.140.248 Nov 10 14:14:28 hpm sshd\[4066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.140.248 Nov 10 14:14:30 hpm sshd\[4066\]: Failed password for invalid user pgsql from 123.207.140.248 port 43903 ssh2 Nov 10 14:19:13 hpm sshd\[4488\]: Invalid user carignan from 123.207.140.248 Nov 10 14:19:13 hpm sshd\[4488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.140.248 |
2019-11-11 08:33:59 |