City: New York City
Region: New York
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.105.30.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24181
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.105.30.5.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062801 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 29 02:26:24 CST 2025
;; MSG SIZE  rcvd: 105
        5.30.105.142.in-addr.arpa domain name pointer syn-142-105-030-005.res.spectrum.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
5.30.105.142.in-addr.arpa	name = syn-142-105-030-005.res.spectrum.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 134.209.12.162 | attack | Nov 8 16:43:22 MK-Soft-VM4 sshd[7488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.12.162 Nov 8 16:43:24 MK-Soft-VM4 sshd[7488]: Failed password for invalid user nuucp from 134.209.12.162 port 37004 ssh2 ...  | 
                    2019-11-08 23:45:57 | 
| 122.224.232.66 | attackspam | Nov 8 11:03:50 mail sshd\[16129\]: Invalid user user1 from 122.224.232.66 Nov 8 11:03:50 mail sshd\[16129\]: Failed none for invalid user user1 from 122.224.232.66 port 43874 ssh2 ...  | 
                    2019-11-09 00:18:50 | 
| 46.101.151.51 | attackbotsspam | Automatic report - Banned IP Access  | 
                    2019-11-09 00:08:24 | 
| 156.155.18.163 | attack | firewall-block, port(s): 60001/tcp  | 
                    2019-11-08 23:55:01 | 
| 14.111.93.172 | attack | Lines containing failures of 14.111.93.172 Nov 8 12:25:52 cdb sshd[27989]: Invalid user wade from 14.111.93.172 port 60648 Nov 8 12:25:52 cdb sshd[27989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.172 Nov 8 12:25:54 cdb sshd[27989]: Failed password for invalid user wade from 14.111.93.172 port 60648 ssh2 Nov 8 12:25:55 cdb sshd[27989]: Received disconnect from 14.111.93.172 port 60648:11: Bye Bye [preauth] Nov 8 12:25:55 cdb sshd[27989]: Disconnected from invalid user wade 14.111.93.172 port 60648 [preauth] Nov 8 12:42:16 cdb sshd[28995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.111.93.172 user=r.r Nov 8 12:42:18 cdb sshd[28995]: Failed password for r.r from 14.111.93.172 port 54298 ssh2 Nov 8 12:42:18 cdb sshd[28995]: Received disconnect from 14.111.93.172 port 54298:11: Bye Bye [preauth] Nov 8 12:42:18 cdb sshd[28995]: Disconnected from authenticating use........ ------------------------------  | 
                    2019-11-09 00:20:05 | 
| 222.186.175.150 | attackbotsspam | Nov 8 13:25:18 firewall sshd[3215]: Failed password for root from 222.186.175.150 port 43386 ssh2 Nov 8 13:25:23 firewall sshd[3215]: Failed password for root from 222.186.175.150 port 43386 ssh2 Nov 8 13:25:27 firewall sshd[3215]: Failed password for root from 222.186.175.150 port 43386 ssh2 ...  | 
                    2019-11-09 00:28:48 | 
| 187.183.41.145 | attackspam | Brute force attempt  | 
                    2019-11-09 00:19:27 | 
| 45.143.221.14 | attackbotsspam | ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak  | 
                    2019-11-09 00:12:03 | 
| 222.186.173.180 | attack | Nov 8 16:46:30 vpn01 sshd[10430]: Failed password for root from 222.186.173.180 port 33226 ssh2 Nov 8 16:46:35 vpn01 sshd[10430]: Failed password for root from 222.186.173.180 port 33226 ssh2 ...  | 
                    2019-11-08 23:46:49 | 
| 221.214.74.10 | attackbots | Nov 8 04:33:57 web1 sshd\[21971\]: Invalid user wiscom from 221.214.74.10 Nov 8 04:33:57 web1 sshd\[21971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.214.74.10 Nov 8 04:34:00 web1 sshd\[21971\]: Failed password for invalid user wiscom from 221.214.74.10 port 2094 ssh2 Nov 8 04:39:42 web1 sshd\[22554\]: Invalid user sbdfffitxit110110jsnet from 221.214.74.10 Nov 8 04:39:42 web1 sshd\[22554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.214.74.10  | 
                    2019-11-09 00:23:15 | 
| 190.7.157.130 | attack | Brute force attempt  | 
                    2019-11-09 00:15:59 | 
| 185.176.27.166 | attackbots | 11/08/2019-15:53:22.292129 185.176.27.166 Protocol: 6 ET DROP Dshield Block Listed Source group 1  | 
                    2019-11-08 23:45:38 | 
| 123.207.188.95 | attackbots | Nov 8 17:04:37 vps647732 sshd[32115]: Failed password for root from 123.207.188.95 port 36936 ssh2 ...  | 
                    2019-11-09 00:22:41 | 
| 58.225.75.147 | attackbotsspam | firewall-block, port(s): 8545/tcp  | 
                    2019-11-09 00:10:26 | 
| 219.151.22.20 | attackbotsspam | port scan and connect, tcp 1433 (ms-sql-s)  | 
                    2019-11-09 00:02:35 |