City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.130.121.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6794
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.130.121.42. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019082500 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 25 17:21:13 CST 2019
;; MSG SIZE rcvd: 118
42.121.130.157.in-addr.arpa domain name pointer Internet-gw.customer.alter.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
42.121.130.157.in-addr.arpa name = Internet-gw.customer.alter.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
166.70.207.2 | attack | 01/23/2020-05:42:54.003693 166.70.207.2 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 15 |
2020-01-23 14:23:01 |
139.199.112.85 | attack | Unauthorized connection attempt detected from IP address 139.199.112.85 to port 2220 [J] |
2020-01-23 14:19:57 |
139.162.77.6 | attackspam | " " |
2020-01-23 13:52:36 |
187.138.195.17 | attackbots | Unauthorized connection attempt detected from IP address 187.138.195.17 to port 22 [J] |
2020-01-23 13:57:46 |
118.100.49.236 | attackspambots | $f2bV_matches |
2020-01-23 13:55:16 |
177.1.214.84 | attack | Unauthorized connection attempt detected from IP address 177.1.214.84 to port 2220 [J] |
2020-01-23 14:14:02 |
201.92.97.195 | attackspam | Honeypot attack, port: 445, PTR: 201-92-97-195.dsl.telesp.net.br. |
2020-01-23 13:48:47 |
223.149.177.111 | attackbots | GPON Home Routers Remote Code Execution Vulnerability |
2020-01-23 13:53:47 |
64.225.124.16 | attackspambots | 22/tcp [2020-01-23]1pkt |
2020-01-23 14:06:15 |
94.199.19.178 | attack | Unauthorized connection attempt from IP address 94.199.19.178 on Port 445(SMB) |
2020-01-23 13:45:29 |
222.186.180.6 | attackbots | Jan2306:48:49server6sshd[29135]:refusedconnectfrom222.186.180.6\(222.186.180.6\)Jan2306:48:49server6sshd[29134]:refusedconnectfrom222.186.180.6\(222.186.180.6\)Jan2306:48:49server6sshd[29136]:refusedconnectfrom222.186.180.6\(222.186.180.6\)Jan2306:48:49server6sshd[29137]:refusedconnectfrom222.186.180.6\(222.186.180.6\)Jan2307:02:12server6sshd[29760]:refusedconnectfrom222.186.180.6\(222.186.180.6\) |
2020-01-23 14:15:59 |
180.248.216.110 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-23 13:54:32 |
190.77.159.32 | attack | Honeypot attack, port: 445, PTR: 190-77-159-32.dyn.dsl.cantv.net. |
2020-01-23 13:45:59 |
77.247.181.162 | attackbotsspam | 01/23/2020-06:58:35.649495 77.247.181.162 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 79 |
2020-01-23 14:23:27 |
222.186.175.202 | attackspam | Jan 22 20:05:19 php1 sshd\[4973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202 user=root Jan 22 20:05:21 php1 sshd\[4973\]: Failed password for root from 222.186.175.202 port 21672 ssh2 Jan 22 20:05:37 php1 sshd\[4985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202 user=root Jan 22 20:05:39 php1 sshd\[4985\]: Failed password for root from 222.186.175.202 port 47236 ssh2 Jan 22 20:05:59 php1 sshd\[5019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202 user=root |
2020-01-23 14:08:07 |