City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.136.81.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43812
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.136.81.136. IN A
;; AUTHORITY SECTION:
. 216 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:19:17 CST 2022
;; MSG SIZE rcvd: 107
136.81.136.142.in-addr.arpa domain name pointer www.twcsc.com.
136.81.136.142.in-addr.arpa domain name pointer twcnc.com.
136.81.136.142.in-addr.arpa domain name pointer twcdigitalphone.com.
136.81.136.142.in-addr.arpa domain name pointer timewarnerpowerhouse.com.
136.81.136.142.in-addr.arpa domain name pointer elpaquetazo.com.
136.81.136.142.in-addr.arpa domain name pointer www.timewarnerpowerhouse.com.
136.81.136.142.in-addr.arpa domain name pointer elpaq.com.
136.81.136.142.in-addr.arpa domain name pointer www.twcarolina.com.
136.81.136.142.in-addr.arpa domain name pointer twcarolina.com.
136.81.136.142.in-addr.arpa domain name pointer twcsc.com.
136.81.136.142.in-addr.arpa domain name pointer www.twcdigitalphone.com.
136.81.136.142.in-addr.arpa domain name pointer www.elpaquetazo.com.
136.81.136.142.in-addr.arpa domain name pointer www.twcnc.com.
136.81.136.142.in-addr.arpa domain name pointer www.elpaq.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
136.81.136.142.in-addr.arpa name = www.twcsc.com.
136.81.136.142.in-addr.arpa name = twcnc.com.
136.81.136.142.in-addr.arpa name = twcdigitalphone.com.
136.81.136.142.in-addr.arpa name = timewarnerpowerhouse.com.
136.81.136.142.in-addr.arpa name = elpaquetazo.com.
136.81.136.142.in-addr.arpa name = www.timewarnerpowerhouse.com.
136.81.136.142.in-addr.arpa name = elpaq.com.
136.81.136.142.in-addr.arpa name = www.twcarolina.com.
136.81.136.142.in-addr.arpa name = twcarolina.com.
136.81.136.142.in-addr.arpa name = twcsc.com.
136.81.136.142.in-addr.arpa name = www.twcdigitalphone.com.
136.81.136.142.in-addr.arpa name = www.elpaquetazo.com.
136.81.136.142.in-addr.arpa name = www.twcnc.com.
136.81.136.142.in-addr.arpa name = www.elpaq.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
104.207.159.104 | attack | Automatic report - Web App Attack |
2019-07-04 16:27:21 |
184.105.139.122 | attackspambots | 27017/tcp 873/tcp 5900/tcp... [2019-05-05/07-03]39pkt,13pt.(tcp),2pt.(udp) |
2019-07-04 16:46:46 |
110.45.145.178 | attack | Jul 4 09:23:01 * sshd[25322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.45.145.178 Jul 4 09:23:03 * sshd[25322]: Failed password for invalid user test from 110.45.145.178 port 59540 ssh2 |
2019-07-04 16:45:58 |
103.85.60.155 | attackspambots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 09:57:27,659 INFO [shellcode_manager] (103.85.60.155) no match, writing hexdump (3faa320e0eab4d237f476b0ccffecc15 :2265607) - MS17010 (EternalBlue) |
2019-07-04 16:59:52 |
75.134.8.29 | attackspambots | 2019-07-04T09:34:21.164629cavecanem sshd[8374]: Invalid user abc from 75.134.8.29 port 1706 2019-07-04T09:34:21.167209cavecanem sshd[8374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.134.8.29 2019-07-04T09:34:21.164629cavecanem sshd[8374]: Invalid user abc from 75.134.8.29 port 1706 2019-07-04T09:34:22.985892cavecanem sshd[8374]: Failed password for invalid user abc from 75.134.8.29 port 1706 ssh2 2019-07-04T09:36:49.904262cavecanem sshd[9269]: Invalid user pokemon from 75.134.8.29 port 64598 2019-07-04T09:36:49.908758cavecanem sshd[9269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.134.8.29 2019-07-04T09:36:49.904262cavecanem sshd[9269]: Invalid user pokemon from 75.134.8.29 port 64598 2019-07-04T09:36:52.379641cavecanem sshd[9269]: Failed password for invalid user pokemon from 75.134.8.29 port 64598 ssh2 2019-07-04T09:39:13.930746cavecanem sshd[9877]: Invalid user wai from 75.134.8.29 port ... |
2019-07-04 16:32:48 |
190.145.132.250 | attackspam | proto=tcp . spt=55901 . dpt=25 . (listed on Github Combined on 4 lists ) (420) |
2019-07-04 16:20:39 |
202.51.189.122 | attackspambots | proto=tcp . spt=55890 . dpt=25 . (listed on Blocklist de Jul 03) (424) |
2019-07-04 16:11:13 |
77.247.181.162 | attackspam | Jul 4 10:10:26 km20725 sshd\[26690\]: Failed password for root from 77.247.181.162 port 50288 ssh2Jul 4 10:10:29 km20725 sshd\[26690\]: Failed password for root from 77.247.181.162 port 50288 ssh2Jul 4 10:10:32 km20725 sshd\[26690\]: Failed password for root from 77.247.181.162 port 50288 ssh2Jul 4 10:10:35 km20725 sshd\[26690\]: Failed password for root from 77.247.181.162 port 50288 ssh2 ... |
2019-07-04 16:47:59 |
197.157.20.202 | attack | 19/7/4@03:37:11: FAIL: Alarm-Intrusion address from=197.157.20.202 19/7/4@03:37:11: FAIL: Alarm-Intrusion address from=197.157.20.202 ... |
2019-07-04 16:14:22 |
45.227.254.6 | attack | RDP Bruteforce |
2019-07-04 17:03:18 |
96.45.245.194 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 09:09:00,865 INFO [shellcode_manager] (96.45.245.194) no match, writing hexdump (7f38e7bc29256b45bc1170551c445208 :2064781) - MS17010 (EternalBlue) |
2019-07-04 16:49:40 |
107.170.203.160 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-04 16:31:52 |
142.93.107.37 | attackbotsspam | Automated report - ssh fail2ban: Jul 4 09:46:13 authentication failure Jul 4 09:46:15 wrong password, user=justin, port=50548, ssh2 Jul 4 09:48:13 authentication failure |
2019-07-04 16:18:57 |
218.69.91.84 | attackspam | Jul 4 09:59:00 vps647732 sshd[24803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.69.91.84 Jul 4 09:59:02 vps647732 sshd[24803]: Failed password for invalid user arkserver from 218.69.91.84 port 57965 ssh2 ... |
2019-07-04 16:10:11 |
14.248.80.91 | attackbots | 445/tcp 445/tcp 445/tcp... [2019-05-28/07-04]5pkt,1pt.(tcp) |
2019-07-04 16:17:08 |