City: Los Angeles
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.242.13.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50317
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;157.242.13.28. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025081300 1800 900 604800 86400
;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 14 00:22:18 CST 2025
;; MSG SIZE rcvd: 106
Host 28.13.242.157.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 28.13.242.157.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
39.42.90.219 | attackbots | Email rejected due to spam filtering |
2020-02-14 23:27:34 |
189.36.207.142 | attackbots | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-14 23:59:32 |
145.239.239.83 | attackbotsspam | (sshd) Failed SSH login from 145.239.239.83 (PL/Poland/-/-/ip83.ip-145-239-239.eu/[AS16276 OVH SAS]): 1 in the last 3600 secs |
2020-02-15 00:03:32 |
118.68.197.214 | attack | firewall-block, port(s): 23/tcp |
2020-02-15 00:00:20 |
201.244.64.146 | attackbotsspam | Feb 14 15:54:37 mout sshd[24575]: Connection closed by 201.244.64.146 port 38617 [preauth] |
2020-02-14 23:53:12 |
188.166.246.46 | attackbotsspam | Feb 14 10:23:51 plusreed sshd[23658]: Invalid user oracle from 188.166.246.46 ... |
2020-02-14 23:31:16 |
37.49.225.166 | attackspam | Fail2Ban Ban Triggered |
2020-02-15 00:07:21 |
105.27.245.243 | attack | Honeypot attack, port: 81, PTR: PTR record not found |
2020-02-14 23:40:54 |
47.188.41.97 | attackbots | Feb 14 05:56:54 web9 sshd\[13638\]: Invalid user test from 47.188.41.97 Feb 14 05:56:54 web9 sshd\[13638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.188.41.97 Feb 14 05:56:56 web9 sshd\[13638\]: Failed password for invalid user test from 47.188.41.97 port 56386 ssh2 Feb 14 06:00:57 web9 sshd\[14293\]: Invalid user poestman from 47.188.41.97 Feb 14 06:00:57 web9 sshd\[14293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.188.41.97 |
2020-02-15 00:06:15 |
52.34.83.11 | attackbots | 02/14/2020-16:41:47.365367 52.34.83.11 Protocol: 6 SURICATA TLS invalid record/traffic |
2020-02-14 23:44:18 |
45.95.33.95 | attack | Autoban 45.95.33.95 AUTH/CONNECT |
2020-02-14 23:57:59 |
189.63.253.80 | attackspambots | Honeypot attack, port: 81, PTR: bd3ffd50.virtua.com.br. |
2020-02-14 23:29:02 |
196.52.43.77 | attack | Server penetration trying other domain names than server publicly serves (ex https://localhost) |
2020-02-15 00:04:18 |
179.96.180.90 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-14 23:23:41 |
95.189.105.91 | attackbots | Automatic report - Port Scan Attack |
2020-02-14 23:41:20 |