City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.44.63.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1087
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;146.44.63.66. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025121600 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 13:56:38 CST 2025
;; MSG SIZE rcvd: 105
66.63.44.146.in-addr.arpa domain name pointer non-routed-un-exposed-IP.44.146.in-addr.arpa.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
66.63.44.146.in-addr.arpa name = non-routed-un-exposed-IP.44.146.in-addr.arpa.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.119.213.92 | attackspambots | Automatic report - Banned IP Access |
2020-09-05 04:59:01 |
| 172.81.239.252 | attack | " " |
2020-09-05 04:39:09 |
| 49.228.155.241 | attackspambots | Honeypot attack, port: 445, PTR: 49-228-155-0.24.nat.tls1b-cgn03.myaisfibre.com. |
2020-09-05 04:29:05 |
| 179.25.144.212 | attackbotsspam | Sep 4 18:53:44 mellenthin postfix/smtpd[30191]: NOQUEUE: reject: RCPT from r179-25-144-212.dialup.adsl.anteldata.net.uy[179.25.144.212]: 554 5.7.1 Service unavailable; Client host [179.25.144.212] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/179.25.144.212; from= |
2020-09-05 04:52:13 |
| 27.153.182.147 | attack | Invalid user students from 27.153.182.147 port 48920 |
2020-09-05 04:27:18 |
| 23.129.64.197 | attackspam | Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-09-05 04:40:29 |
| 103.230.103.114 | attackspam | 1599238407 - 09/04/2020 18:53:27 Host: 103.230.103.114/103.230.103.114 Port: 445 TCP Blocked |
2020-09-05 05:01:45 |
| 14.191.132.124 | attackspam | Honeypot attack, port: 445, PTR: static.vnpt.vn. |
2020-09-05 05:00:38 |
| 222.186.190.2 | attackspam | (sshd) Failed SSH login from 222.186.190.2 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 4 14:49:56 cvps sshd[28159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2 user=root Sep 4 14:49:57 cvps sshd[28159]: Failed password for root from 222.186.190.2 port 23470 ssh2 Sep 4 14:50:00 cvps sshd[28159]: Failed password for root from 222.186.190.2 port 23470 ssh2 Sep 4 14:50:03 cvps sshd[28159]: Failed password for root from 222.186.190.2 port 23470 ssh2 Sep 4 14:50:06 cvps sshd[28159]: Failed password for root from 222.186.190.2 port 23470 ssh2 |
2020-09-05 04:53:35 |
| 45.178.99.12 | attackbots | Sep 4 18:53:37 mellenthin postfix/smtpd[29055]: NOQUEUE: reject: RCPT from unknown[45.178.99.12]: 554 5.7.1 Service unavailable; Client host [45.178.99.12] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/45.178.99.12; from= |
2020-09-05 04:58:24 |
| 208.65.181.179 | attackbotsspam | $f2bV_matches |
2020-09-05 04:40:51 |
| 68.173.53.124 | attackbotsspam | Sep 4 18:53:27 theomazars sshd[22028]: Invalid user pi from 68.173.53.124 port 50008 |
2020-09-05 05:04:04 |
| 91.227.17.18 | attackbots | Honeypot hit. |
2020-09-05 04:38:14 |
| 111.250.84.76 | attack | Honeypot attack, port: 445, PTR: 111-250-84-76.dynamic-ip.hinet.net. |
2020-09-05 04:57:50 |
| 14.98.181.171 | attackbotsspam | Unauthorized connection attempt from IP address 14.98.181.171 on Port 445(SMB) |
2020-09-05 05:02:36 |