City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.136.81.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36682
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.136.81.135. IN A
;; AUTHORITY SECTION:
. 164 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:19:17 CST 2022
;; MSG SIZE rcvd: 107
135.81.136.142.in-addr.arpa domain name pointer www.twcnc.com.
135.81.136.142.in-addr.arpa domain name pointer elpaq.com.
135.81.136.142.in-addr.arpa domain name pointer elpaquetazo.com.
135.81.136.142.in-addr.arpa domain name pointer twcsc.com.
135.81.136.142.in-addr.arpa domain name pointer www.twcarolina.com.
135.81.136.142.in-addr.arpa domain name pointer www.elpaq.com.
135.81.136.142.in-addr.arpa domain name pointer twcnc.com.
135.81.136.142.in-addr.arpa domain name pointer twcdigitalphone.com.
135.81.136.142.in-addr.arpa domain name pointer www.timewarnerpowerhouse.com.
135.81.136.142.in-addr.arpa domain name pointer www.elpaquetazo.com.
135.81.136.142.in-addr.arpa domain name pointer twcarolina.com.
135.81.136.142.in-addr.arpa domain name pointer www.twcdigitalphone.com.
135.81.136.142.in-addr.arpa domain name pointer timewarnerpowerhouse.com.
135.81.136.142.in-addr.arpa domain name pointer www.twcsc.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
135.81.136.142.in-addr.arpa name = elpaquetazo.com.
135.81.136.142.in-addr.arpa name = twcsc.com.
135.81.136.142.in-addr.arpa name = www.twcarolina.com.
135.81.136.142.in-addr.arpa name = www.elpaq.com.
135.81.136.142.in-addr.arpa name = twcnc.com.
135.81.136.142.in-addr.arpa name = twcdigitalphone.com.
135.81.136.142.in-addr.arpa name = www.timewarnerpowerhouse.com.
135.81.136.142.in-addr.arpa name = www.elpaquetazo.com.
135.81.136.142.in-addr.arpa name = twcarolina.com.
135.81.136.142.in-addr.arpa name = www.twcdigitalphone.com.
135.81.136.142.in-addr.arpa name = timewarnerpowerhouse.com.
135.81.136.142.in-addr.arpa name = www.twcsc.com.
135.81.136.142.in-addr.arpa name = www.twcnc.com.
135.81.136.142.in-addr.arpa name = elpaq.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
91.215.205.241 | attackspambots | 1579870053 - 01/24/2020 13:47:33 Host: 91.215.205.241/91.215.205.241 Port: 445 TCP Blocked |
2020-01-24 22:49:51 |
177.140.197.32 | attackspam | Jan 24 15:07:18 vps691689 sshd[9267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.140.197.32 Jan 24 15:07:20 vps691689 sshd[9267]: Failed password for invalid user sarah from 177.140.197.32 port 50904 ssh2 ... |
2020-01-24 22:25:45 |
71.6.233.179 | attack | 4001/tcp 55443/tcp 60443/tcp... [2019-12-18/2020-01-24]4pkt,4pt.(tcp) |
2020-01-24 22:48:03 |
46.217.118.230 | attackspam | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2020-01-24 23:04:09 |
82.138.61.157 | attackbots | Unauthorized connection attempt from IP address 82.138.61.157 on Port 445(SMB) |
2020-01-24 22:59:58 |
100.8.79.226 | attack | 1433/tcp 445/tcp... [2019-12-12/2020-01-24]5pkt,2pt.(tcp) |
2020-01-24 22:38:49 |
58.216.149.158 | attackbots | Unauthorized connection attempt detected from IP address 58.216.149.158 to port 1433 [J] |
2020-01-24 23:03:55 |
58.252.68.4 | attackbotsspam | SIP/5060 Probe, BF, Hack - |
2020-01-24 22:27:43 |
58.252.108.40 | attackbotsspam | SIP/5060 Probe, BF, Hack - |
2020-01-24 22:31:49 |
218.92.0.204 | attackbotsspam | 2020-01-24T14:59:21.312087abusebot-8.cloudsearch.cf sshd[28663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204 user=root 2020-01-24T14:59:23.476908abusebot-8.cloudsearch.cf sshd[28663]: Failed password for root from 218.92.0.204 port 38457 ssh2 2020-01-24T14:59:25.546834abusebot-8.cloudsearch.cf sshd[28663]: Failed password for root from 218.92.0.204 port 38457 ssh2 2020-01-24T14:59:21.312087abusebot-8.cloudsearch.cf sshd[28663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204 user=root 2020-01-24T14:59:23.476908abusebot-8.cloudsearch.cf sshd[28663]: Failed password for root from 218.92.0.204 port 38457 ssh2 2020-01-24T14:59:25.546834abusebot-8.cloudsearch.cf sshd[28663]: Failed password for root from 218.92.0.204 port 38457 ssh2 2020-01-24T14:59:21.312087abusebot-8.cloudsearch.cf sshd[28663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho ... |
2020-01-24 23:04:31 |
117.211.36.150 | attackspam | Telnet/23 MH Probe, BF, Hack - |
2020-01-24 22:43:56 |
5.135.224.152 | attackspam | Jan 24 17:46:00 hosting sshd[14730]: Invalid user valeria from 5.135.224.152 port 51592 ... |
2020-01-24 22:57:05 |
131.72.156.1 | attack | Unauthorized connection attempt from IP address 131.72.156.1 on Port 445(SMB) |
2020-01-24 22:24:19 |
182.92.242.45 | attack | [Fri Jan 24 14:37:10.044188 2020] [access_compat:error] [pid 9964:tid 140713081071360] [client 182.92.242.45:41444] AH01797: client denied by server configuration: /var/www/html/TP [Fri Jan 24 14:37:12.145919 2020] [access_compat:error] [pid 9963:tid 140712498677504] [client 182.92.242.45:42564] AH01797: client denied by server configuration: /var/www/html/TP [Fri Jan 24 14:37:14.068978 2020] [access_compat:error] [pid 9963:tid 140712473499392] [client 182.92.242.45:42630] AH01797: client denied by server configuration: /var/www/html/thinkphp [Fri Jan 24 14:37:19.045018 2020] [access_compat:error] [pid 9963:tid 140711835981568] [client 182.92.242.45:43716] AH01797: client denied by server configuration: /var/www/html/html [Fri Jan 24 14:37:21.044279 2020] [access_compat:error] [pid 9963:tid 140711844374272] [client 182.92.242.45:45826] AH01797: client denied by server configuration: /var/www/html/public ... |
2020-01-24 23:05:45 |
201.247.246.18 | attack | Unauthorized connection attempt from IP address 201.247.246.18 on Port 445(SMB) |
2020-01-24 22:33:01 |