City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.239.12.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28141
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;158.239.12.199. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031800 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 18 14:41:20 CST 2022
;; MSG SIZE rcvd: 107
b'199.12.239.158.in-addr.arpa is an alias for 254.255.239.158.in-addr.arpa.
254.255.239.158.in-addr.arpa domain name pointer 158-239-host.usmc.mil.
'
b'199.12.239.158.in-addr.arpa canonical name = 254.255.239.158.in-addr.arpa.
254.255.239.158.in-addr.arpa name = 158-239-host.usmc.mil.
Authoritative answers can be found from:
'
IP | Type | Details | Datetime |
---|---|---|---|
162.247.72.199 | attackspambots | Jul 4 11:08:59 km20725 sshd\[30812\]: Address 162.247.72.199 maps to jaffer.tor-exit.calyxinstitute.org, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Jul 4 11:09:01 km20725 sshd\[30812\]: Failed password for root from 162.247.72.199 port 55450 ssh2Jul 4 11:09:04 km20725 sshd\[30812\]: Failed password for root from 162.247.72.199 port 55450 ssh2Jul 4 11:09:06 km20725 sshd\[30812\]: Failed password for root from 162.247.72.199 port 55450 ssh2 ... |
2019-07-04 17:23:18 |
87.237.9.22 | attackspam | Spam Timestamp : 04-Jul-19 05:42 _ BlockList Provider combined abuse _ (403) |
2019-07-04 17:44:02 |
159.65.137.206 | attackspambots | 04.07.2019 08:12:12 - Wordpress fail Detected by ELinOX-ALM |
2019-07-04 17:45:46 |
82.194.91.27 | attack | Spam Timestamp : 04-Jul-19 06:43 _ BlockList Provider combined abuse _ (412) |
2019-07-04 17:35:55 |
201.243.56.116 | attack | 445/tcp [2019-07-04]1pkt |
2019-07-04 18:14:53 |
198.20.103.242 | attackbots | [connect count:8 time(s)][SMTP/25/465/587 Probe] [SMTPD] RECEIVED: EHLO sh-ams-nl-gp1-wk101.internet-census.org [SMTPD] SENT: 554 5.7.1 Rejected: banned by AbuseIpDb in blocklist.de:"listed [mail]" *(07041045) |
2019-07-04 17:29:38 |
109.123.117.249 | attackspambots | 9527/tcp 65535/tcp 993/tcp... [2019-05-04/07-04]14pkt,10pt.(tcp),2pt.(udp) |
2019-07-04 17:16:59 |
103.24.173.98 | attackspam | TCP src-port=45186 dst-port=25 dnsbl-sorbs abuseat-org spamcop (398) |
2019-07-04 17:53:51 |
192.241.159.27 | attack | $f2bV_matches |
2019-07-04 18:17:31 |
162.243.144.186 | attackbotsspam | " " |
2019-07-04 17:48:33 |
82.110.197.50 | attackspam | 19/7/4@02:12:35: FAIL: Alarm-Intrusion address from=82.110.197.50 ... |
2019-07-04 17:18:38 |
184.105.139.96 | attack | 50075/tcp 30005/tcp 8080/tcp... [2019-05-06/07-04]32pkt,16pt.(tcp),1pt.(udp) |
2019-07-04 17:34:17 |
67.231.242.50 | attackspam | Spam Timestamp : 04-Jul-19 06:10 _ BlockList Provider combined abuse _ (409) |
2019-07-04 17:38:59 |
107.170.76.170 | attackbotsspam | 2019-07-04T07:15:12.900808abusebot-4.cloudsearch.cf sshd\[8297\]: Invalid user ntadmin from 107.170.76.170 port 48058 |
2019-07-04 17:22:15 |
198.108.66.220 | attackbotsspam | 8081/tcp 8088/tcp 631/tcp... [2019-05-13/07-04]13pkt,12pt.(tcp) |
2019-07-04 17:14:05 |