City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 160.39.2.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55108
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;160.39.2.74. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 20:29:50 CST 2025
;; MSG SIZE rcvd: 104
74.2.39.160.in-addr.arpa domain name pointer dyn-160-39-2-74.dyn.columbia.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
74.2.39.160.in-addr.arpa name = dyn-160-39-2-74.dyn.columbia.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
170.245.79.202 | attackspam | Unauthorized connection attempt from IP address 170.245.79.202 on Port 445(SMB) |
2020-08-26 23:07:25 |
180.253.40.127 | attackbotsspam | $f2bV_matches |
2020-08-26 23:38:10 |
101.78.229.4 | attackspambots | Aug 26 14:26:12 icinga sshd[17814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.229.4 Aug 26 14:26:14 icinga sshd[17814]: Failed password for invalid user lhf from 101.78.229.4 port 57242 ssh2 Aug 26 14:35:06 icinga sshd[32190]: Failed password for root from 101.78.229.4 port 50644 ssh2 ... |
2020-08-26 23:23:42 |
138.197.89.212 | attack |
|
2020-08-26 23:43:27 |
61.95.179.221 | attackspam | Fail2Ban |
2020-08-26 23:32:07 |
218.92.0.249 | attackbots | Aug 26 17:12:23 * sshd[17877]: Failed password for root from 218.92.0.249 port 57624 ssh2 Aug 26 17:12:36 * sshd[17877]: error: maximum authentication attempts exceeded for root from 218.92.0.249 port 57624 ssh2 [preauth] |
2020-08-26 23:24:01 |
5.56.132.78 | attack | Bruteforce detected by fail2ban |
2020-08-26 23:12:50 |
193.27.229.47 | attack | firewall-block, port(s): 11587/tcp, 11591/tcp, 11684/tcp |
2020-08-26 23:55:16 |
164.68.112.178 | attack |
|
2020-08-26 23:57:11 |
38.90.148.110 | attack | Flask-IPban - exploit URL requested:/owa/auth/logon.aspx |
2020-08-26 23:42:53 |
213.217.1.38 | attack | firewall-block, port(s): 24149/tcp |
2020-08-26 23:40:16 |
49.232.162.235 | attack | SSH login attempts. |
2020-08-26 23:29:15 |
193.27.228.157 | attackbotsspam | scans 20 times in preceeding hours on the ports (in chronological order) 2075 1913 1742 1216 1688 1843 1575 1497 1546 1630 1213 2046 2038 2389 1103 1821 1542 1112 2176 2321 |
2020-08-26 23:55:56 |
193.27.229.232 | attack | scans 4 times in preceeding hours on the ports (in chronological order) 65106 65406 56007 55003 |
2020-08-26 23:52:15 |
222.186.190.17 | attackbots | Aug 26 15:13:43 rush sshd[3807]: Failed password for root from 222.186.190.17 port 51768 ssh2 Aug 26 15:13:45 rush sshd[3807]: Failed password for root from 222.186.190.17 port 51768 ssh2 Aug 26 15:13:47 rush sshd[3807]: Failed password for root from 222.186.190.17 port 51768 ssh2 ... |
2020-08-26 23:22:50 |