City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.34.39.174
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14071
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;135.34.39.174. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 16:06:45 CST 2025
;; MSG SIZE rcvd: 106
174.39.34.135.in-addr.arpa domain name pointer nothing.attdns.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
174.39.34.135.in-addr.arpa name = nothing.attdns.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
58.220.2.92 | attackspam | 2019-11-22T13:57:20.292Z CLOSE host=58.220.2.92 port=60986 fd=5 time=30.003 bytes=54 2019-11-22T13:57:20.292Z CLOSE host=58.220.2.92 port=60990 fd=6 time=30.002 bytes=46 2019-11-22T13:57:20.294Z CLOSE host=58.220.2.92 port=60978 fd=7 time=30.001 bytes=41 2019-11-22T13:57:20.295Z CLOSE host=58.220.2.92 port=60982 fd=8 time=30.002 bytes=44 2019-11-22T13:57:20.302Z CLOSE host=58.220.2.92 port=60992 fd=9 time=30.001 bytes=19 ... |
2020-03-13 02:54:36 |
51.77.56.9 | attack | suspicious action Thu, 12 Mar 2020 14:06:58 -0300 |
2020-03-13 03:04:15 |
196.246.200.192 | attackspambots | Mar 12 19:28:35 lcl-usvr-02 sshd[5154]: Invalid user admin from 196.246.200.192 port 59054 Mar 12 19:28:35 lcl-usvr-02 sshd[5154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.246.200.192 Mar 12 19:28:35 lcl-usvr-02 sshd[5154]: Invalid user admin from 196.246.200.192 port 59054 Mar 12 19:28:37 lcl-usvr-02 sshd[5154]: Failed password for invalid user admin from 196.246.200.192 port 59054 ssh2 Mar 12 19:28:51 lcl-usvr-02 sshd[5165]: Invalid user admin from 196.246.200.192 port 59330 ... |
2020-03-13 03:16:51 |
5.37.215.244 | attackspambots | 2020-02-10T13:13:15.853Z CLOSE host=5.37.215.244 port=63652 fd=4 time=20.007 bytes=29 ... |
2020-03-13 03:14:11 |
51.141.11.226 | attackbots | 2019-11-27T01:59:12.206Z CLOSE host=51.141.11.226 port=32838 fd=4 time=50.034 bytes=71 2019-11-27T01:59:12.206Z CLOSE host=51.141.11.226 port=36034 fd=5 time=40.021 bytes=63 2019-11-27T01:59:12.208Z CLOSE host=51.141.11.226 port=39534 fd=6 time=30.002 bytes=36 ... |
2020-03-13 03:10:10 |
119.226.50.238 | attackspam | Port probing on unauthorized port 445 |
2020-03-13 03:09:50 |
58.87.76.32 | attackbots | 2020-01-06T11:52:40.868Z CLOSE host=58.87.76.32 port=45554 fd=4 time=10.003 bytes=0 ... |
2020-03-13 02:51:14 |
200.187.173.124 | attack | Unauthorized connection attempt from IP address 200.187.173.124 on Port 445(SMB) |
2020-03-13 02:49:17 |
54.38.92.35 | attack | 2019-12-17T06:32:14.984Z CLOSE host=54.38.92.35 port=60000 fd=4 time=40.041 bytes=33 ... |
2020-03-13 02:59:38 |
211.75.136.205 | attack | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-03-13 03:00:44 |
52.175.214.160 | attackbots | 2020-02-04T04:53:09.988Z CLOSE host=52.175.214.160 port=46036 fd=6 time=20.001 bytes=7 ... |
2020-03-13 03:00:26 |
5.189.191.206 | attackspam | 2019-10-31T10:00:53.048Z CLOSE host=5.189.191.206 port=61933 fd=4 time=40.040 bytes=72 ... |
2020-03-13 03:16:24 |
198.108.66.200 | attackspambots | Mar 12 13:29:01 debian-2gb-nbg1-2 kernel: \[6275279.696015\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.66.200 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=54321 PROTO=TCP SPT=39475 DPT=5900 WINDOW=65535 RES=0x00 SYN URGP=0 |
2020-03-13 02:55:45 |
5.8.10.202 | attackbotsspam | Probing for vulnerable services |
2020-03-13 03:12:11 |
5.197.8.68 | attackspambots | 2019-12-11T17:38:01.999Z CLOSE host=5.197.8.68 port=63051 fd=4 time=20.017 bytes=24 ... |
2020-03-13 03:16:04 |