City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.254.22.174
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;142.254.22.174. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 04:20:26 CST 2025
;; MSG SIZE rcvd: 107
174.22.254.142.in-addr.arpa domain name pointer 142-254-22-174.dsl.dynamic.sonic.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
174.22.254.142.in-addr.arpa name = 142-254-22-174.dsl.dynamic.sonic.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 27.71.108.165 | attackspam | 445/tcp [2020-08-22]1pkt |
2020-08-22 16:34:01 |
| 190.98.228.54 | attackbots | Aug 22 06:01:14 django-0 sshd[30126]: Invalid user wp from 190.98.228.54 ... |
2020-08-22 16:08:59 |
| 189.186.139.18 | attackspam | notenschluessel-fulda.de 189.186.139.18 [22/Aug/2020:05:50:32 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4336 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36" notenschluessel-fulda.de 189.186.139.18 [22/Aug/2020:05:50:35 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4336 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36" |
2020-08-22 16:10:36 |
| 117.30.161.100 | attackspam | Email rejected due to spam filtering |
2020-08-22 16:13:30 |
| 162.243.128.170 | attackbots |
|
2020-08-22 16:24:42 |
| 222.186.175.150 | attackbotsspam | Aug 22 10:17:48 melroy-server sshd[19448]: Failed password for root from 222.186.175.150 port 5892 ssh2 Aug 22 10:17:53 melroy-server sshd[19448]: Failed password for root from 222.186.175.150 port 5892 ssh2 ... |
2020-08-22 16:24:16 |
| 106.52.22.64 | attackspambots | Aug 22 08:48:29 vps333114 sshd[28709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.22.64 Aug 22 08:48:31 vps333114 sshd[28709]: Failed password for invalid user olga from 106.52.22.64 port 44548 ssh2 ... |
2020-08-22 16:04:37 |
| 27.78.32.105 | attackspambots | Automatic report - Port Scan Attack |
2020-08-22 16:26:24 |
| 189.254.242.60 | attackbots | Aug 22 06:43:08 ns381471 sshd[9452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.254.242.60 Aug 22 06:43:11 ns381471 sshd[9452]: Failed password for invalid user wolf from 189.254.242.60 port 46468 ssh2 |
2020-08-22 16:01:44 |
| 45.178.141.20 | attack | "$f2bV_matches" |
2020-08-22 16:38:38 |
| 118.27.33.70 | attackbots | Email rejected due to spam filtering |
2020-08-22 16:14:02 |
| 222.186.175.183 | attack | $f2bV_matches |
2020-08-22 16:17:58 |
| 218.92.0.185 | attackbots | Aug 22 11:22:45 ift sshd\[15875\]: Failed password for root from 218.92.0.185 port 50378 ssh2Aug 22 11:23:02 ift sshd\[15875\]: Failed password for root from 218.92.0.185 port 50378 ssh2Aug 22 11:23:09 ift sshd\[15899\]: Failed password for root from 218.92.0.185 port 14832 ssh2Aug 22 11:23:13 ift sshd\[15899\]: Failed password for root from 218.92.0.185 port 14832 ssh2Aug 22 11:23:16 ift sshd\[15899\]: Failed password for root from 218.92.0.185 port 14832 ssh2 ... |
2020-08-22 16:32:04 |
| 51.104.242.17 | attack | Aug 22 08:31:00 ns392434 sshd[5406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.104.242.17 user=root Aug 22 08:31:03 ns392434 sshd[5406]: Failed password for root from 51.104.242.17 port 51100 ssh2 Aug 22 08:45:07 ns392434 sshd[5653]: Invalid user qemu from 51.104.242.17 port 38198 Aug 22 08:45:07 ns392434 sshd[5653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.104.242.17 Aug 22 08:45:07 ns392434 sshd[5653]: Invalid user qemu from 51.104.242.17 port 38198 Aug 22 08:45:09 ns392434 sshd[5653]: Failed password for invalid user qemu from 51.104.242.17 port 38198 ssh2 Aug 22 08:51:56 ns392434 sshd[5809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.104.242.17 user=root Aug 22 08:51:58 ns392434 sshd[5809]: Failed password for root from 51.104.242.17 port 48080 ssh2 Aug 22 08:58:35 ns392434 sshd[5895]: Invalid user steam1 from 51.104.242.17 port 58372 |
2020-08-22 16:31:02 |
| 211.155.95.246 | attack | Invalid user admin from 211.155.95.246 port 47380 |
2020-08-22 16:18:30 |