City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.150.22.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53077
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.150.22.65.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 07:18:50 CST 2025
;; MSG SIZE  rcvd: 10665.22.150.134.in-addr.arpa domain name pointer syn-134-150-022-065.inf.spectrum.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
65.22.150.134.in-addr.arpa	name = syn-134-150-022-065.inf.spectrum.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 122.238.86.176 | attackspambots | Unauthorized connection attempt from IP address 122.238.86.176 on Port 445(SMB) | 2020-03-12 19:31:25 | 
| 118.24.21.83 | attackbotsspam | Too many connections or unauthorized access detected from Arctic banned ip | 2020-03-12 19:50:22 | 
| 185.248.140.184 | attack | Mar 12 07:13:03 IngegnereFirenze sshd[11501]: User root from 185.248.140.184 not allowed because not listed in AllowUsers ... | 2020-03-12 19:16:58 | 
| 27.72.31.251 | attackspambots | Unauthorized connection attempt from IP address 27.72.31.251 on Port 445(SMB) | 2020-03-12 19:26:30 | 
| 27.221.97.4 | attackbotsspam | Mar 12 05:28:47 plex sshd[4018]: Invalid user vpn from 27.221.97.4 port 54290 | 2020-03-12 19:25:43 | 
| 85.93.57.53 | attackbotsspam | 2020-03-12T12:03:22.438966v22018076590370373 sshd[11348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.93.57.53 2020-03-12T12:03:22.431526v22018076590370373 sshd[11348]: Invalid user minecraft from 85.93.57.53 port 34368 2020-03-12T12:03:24.484712v22018076590370373 sshd[11348]: Failed password for invalid user minecraft from 85.93.57.53 port 34368 ssh2 2020-03-12T12:06:49.151571v22018076590370373 sshd[303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.93.57.53 user=root 2020-03-12T12:06:50.944999v22018076590370373 sshd[303]: Failed password for root from 85.93.57.53 port 37568 ssh2 ... | 2020-03-12 19:32:34 | 
| 211.253.24.250 | attack | suspicious action Thu, 12 Mar 2020 08:29:19 -0300 | 2020-03-12 19:31:03 | 
| 125.24.70.123 | attackbots | Port probing on unauthorized port 8291 | 2020-03-12 19:11:14 | 
| 218.92.0.158 | attackbots | Brute force attempt | 2020-03-12 19:24:08 | 
| 77.91.80.235 | attackbotsspam | Port probing on unauthorized port 23 | 2020-03-12 19:42:51 | 
| 177.244.75.165 | attackbotsspam | [munged]::443 177.244.75.165 - - [12/Mar/2020:06:08:22 +0100] "POST /[munged]: HTTP/1.1" 200 11813 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 177.244.75.165 - - [12/Mar/2020:06:08:23 +0100] "POST /[munged]: HTTP/1.1" 200 7162 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 177.244.75.165 - - [12/Mar/2020:06:08:24 +0100] "POST /[munged]: HTTP/1.1" 200 7162 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 177.244.75.165 - - [12/Mar/2020:06:08:25 +0100] "POST /[munged]: HTTP/1.1" 200 7162 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 177.244.75.165 - - [12/Mar/2020:06:08:26 +0100] "POST /[munged]: HTTP/1.1" 200 7162 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0" [munged]::443 177.244.75.165 - - [12/Mar/2020:06 | 2020-03-12 20:00:35 | 
| 1.46.230.79 | attackspam | 1583991079 - 03/12/2020 06:31:19 Host: 1.46.230.79/1.46.230.79 Port: 445 TCP Blocked | 2020-03-12 19:47:34 | 
| 14.166.10.12 | attackbotsspam | SSH bruteforce more then 50 syn to 22 port per 10 seconds. | 2020-03-12 19:29:38 | 
| 203.40.111.38 | attackbots | $f2bV_matches | 2020-03-12 19:27:03 | 
| 213.160.156.181 | attack | Mar 12 10:09:57 game-panel sshd[11542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.160.156.181 Mar 12 10:10:00 game-panel sshd[11542]: Failed password for invalid user abc1qazxsw2 from 213.160.156.181 port 40636 ssh2 Mar 12 10:18:00 game-panel sshd[11728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.160.156.181 | 2020-03-12 19:40:36 |