City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.32.253.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.32.253.89.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 191 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:16:20 CST 2025
;; MSG SIZE  rcvd: 10689.253.32.134.in-addr.arpa domain name pointer host.slb.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
89.253.32.134.in-addr.arpa	name = host.slb.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 157.230.245.91 | attack | TCP port : 1517 | 2020-10-06 21:58:40 | 
| 178.77.234.45 | attackbots | mail auth brute force | 2020-10-06 22:01:05 | 
| 190.205.234.200 | attackbotsspam | 20/10/5@16:43:39: FAIL: Alarm-Network address from=190.205.234.200 ... | 2020-10-06 21:34:47 | 
| 72.167.190.231 | attackspambots | /1/wp-includes/wlwmanifest.xml | 2020-10-06 22:06:27 | 
| 111.21.99.227 | attackspam | Invalid user dario from 111.21.99.227 port 36742 | 2020-10-06 21:41:20 | 
| 223.255.28.203 | attackspam | Oct 6 17:11:34 itv-usvr-01 sshd[21756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.255.28.203 user=root Oct 6 17:11:36 itv-usvr-01 sshd[21756]: Failed password for root from 223.255.28.203 port 35571 ssh2 Oct 6 17:18:13 itv-usvr-01 sshd[22032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.255.28.203 user=root Oct 6 17:18:15 itv-usvr-01 sshd[22032]: Failed password for root from 223.255.28.203 port 51852 ssh2 | 2020-10-06 21:40:18 | 
| 60.243.49.223 | attackspambots | DATE:2020-10-05 22:43:27, IP:60.243.49.223, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) | 2020-10-06 21:47:37 | 
| 91.221.134.137 | attackbotsspam | mail auth brute force | 2020-10-06 22:00:40 | 
| 77.222.108.207 | attack | Port Scan ... | 2020-10-06 21:35:32 | 
| 45.118.35.7 | attackbotsspam | mail auth brute force | 2020-10-06 22:02:34 | 
| 40.77.167.63 | attackspambots | Automatic report - Banned IP Access | 2020-10-06 21:58:07 | 
| 125.212.217.214 | attack | Found on CINS badguys / proto=6 . srcport=26200 . dstport=6443 . (1808) | 2020-10-06 21:51:19 | 
| 46.145.163.130 | attackbots | php WP PHPmyadamin ABUSE blocked for 12h | 2020-10-06 22:12:22 | 
| 221.195.1.201 | attackbots | sshd: Failed password for .... from 221.195.1.201 port 47402 ssh2 | 2020-10-06 22:03:28 | 
| 177.83.41.16 | attackbots | Attempts against non-existent wp-login | 2020-10-06 21:57:21 |