City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.214.225.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;162.214.225.145. IN A
;; AUTHORITY SECTION:
. 45 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022063001 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 01 07:14:49 CST 2022
;; MSG SIZE rcvd: 108
145.225.214.162.in-addr.arpa domain name pointer server.preet-medicos.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
145.225.214.162.in-addr.arpa name = server.preet-medicos.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
139.194.216.169 | attackspambots | 2019-03-08 17:53:54 1h2Ikr-0001C7-H0 SMTP connection from \(fm-dyn-139-194-216-169.fast.net.id\) \[139.194.216.169\]:49080 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-08 17:55:08 1h2Im3-0001FP-Mj SMTP connection from \(fm-dyn-139-194-216-169.fast.net.id\) \[139.194.216.169\]:49486 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-08 17:55:49 1h2Imi-0001Gc-Du SMTP connection from \(fm-dyn-139-194-216-169.fast.net.id\) \[139.194.216.169\]:49778 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-05 00:58:45 |
89.128.47.163 | attack | Feb 4 14:51:10 grey postfix/smtpd\[12050\]: NOQUEUE: reject: RCPT from unknown\[89.128.47.163\]: 554 5.7.1 Service unavailable\; Client host \[89.128.47.163\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=89.128.47.163\; from=\ |
2020-02-05 00:31:18 |
139.192.234.141 | attackbots | 2019-07-08 15:58:32 1hkUA2-0001uf-VK SMTP connection from \(\[139.192.234.141\]\) \[139.192.234.141\]:24856 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-08 15:58:37 1hkUA8-0001ui-RE SMTP connection from \(\[139.192.234.141\]\) \[139.192.234.141\]:24914 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-08 15:58:44 1hkUAE-0001up-66 SMTP connection from \(\[139.192.234.141\]\) \[139.192.234.141\]:24952 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-05 01:07:20 |
129.211.125.143 | attackspam | Feb 4 14:51:08 mars sshd[4261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.125.143 Feb 4 14:51:10 mars sshd[4261]: Failed password for invalid user bobby from 129.211.125.143 port 47328 ssh2 ... |
2020-02-05 00:33:32 |
136.228.174.31 | attack | Feb 4 14:50:55 grey postfix/smtpd\[26473\]: NOQUEUE: reject: RCPT from unknown\[136.228.174.31\]: 554 5.7.1 Service unavailable\; Client host \[136.228.174.31\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=136.228.174.31\; from=\ |
2020-02-05 00:50:19 |
125.16.33.1 | attackspam | Feb 4 14:50:56 grey postfix/smtpd\[23100\]: NOQUEUE: reject: RCPT from unknown\[125.16.33.1\]: 554 5.7.1 Service unavailable\; Client host \[125.16.33.1\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=125.16.33.1\; from=\ |
2020-02-05 00:51:01 |
187.162.82.180 | attack | Automatic report - Port Scan Attack |
2020-02-05 00:29:02 |
222.186.42.75 | attackspambots | Unauthorized connection attempt detected from IP address 222.186.42.75 to port 22 [J] |
2020-02-05 00:54:02 |
139.228.161.11 | attackspambots | 2019-06-21 08:27:32 1heD1D-0003lC-5N SMTP connection from \(fm-dyn-139-228-161-11.fast.net.id\) \[139.228.161.11\]:49615 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-21 08:27:46 1heD1S-0003lN-4j SMTP connection from \(fm-dyn-139-228-161-11.fast.net.id\) \[139.228.161.11\]:49664 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-21 08:27:54 1heD1b-0003lV-Ip SMTP connection from \(fm-dyn-139-228-161-11.fast.net.id\) \[139.228.161.11\]:49707 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-05 00:49:46 |
198.108.66.202 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-05 00:28:27 |
222.186.30.167 | attackbotsspam | Feb 4 17:39:56 * sshd[11253]: Failed password for root from 222.186.30.167 port 54590 ssh2 |
2020-02-05 00:46:46 |
188.166.115.226 | attackspam | Feb 4 15:56:25 srv-ubuntu-dev3 sshd[29220]: Invalid user zonaWifi from 188.166.115.226 Feb 4 15:56:25 srv-ubuntu-dev3 sshd[29220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.115.226 Feb 4 15:56:25 srv-ubuntu-dev3 sshd[29220]: Invalid user zonaWifi from 188.166.115.226 Feb 4 15:56:27 srv-ubuntu-dev3 sshd[29220]: Failed password for invalid user zonaWifi from 188.166.115.226 port 50664 ssh2 Feb 4 15:59:29 srv-ubuntu-dev3 sshd[29504]: Invalid user musikbot from 188.166.115.226 Feb 4 15:59:29 srv-ubuntu-dev3 sshd[29504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.115.226 Feb 4 15:59:29 srv-ubuntu-dev3 sshd[29504]: Invalid user musikbot from 188.166.115.226 Feb 4 15:59:32 srv-ubuntu-dev3 sshd[29504]: Failed password for invalid user musikbot from 188.166.115.226 port 52430 ssh2 Feb 4 16:02:27 srv-ubuntu-dev3 sshd[29778]: Invalid user bo from 188.166.115.226 ... |
2020-02-05 00:42:37 |
66.249.79.50 | attackbotsspam | Unauthorized connection attempt detected from IP address 66.249.79.50 to port 80 |
2020-02-05 00:39:47 |
139.28.219.39 | attack | 2019-03-03 12:08:26 1h0Oyo-00034u-OY SMTP connection from equable.doapex.com \(equable.velosnaryaga.host\) \[139.28.219.39\]:59597 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-03 12:10:53 1h0P1B-0003Aw-Sp SMTP connection from equable.doapex.com \(equable.velosnaryaga.host\) \[139.28.219.39\]:55765 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-03 12:11:23 1h0P1f-0003BZ-HZ SMTP connection from equable.doapex.com \(equable.velosnaryaga.host\) \[139.28.219.39\]:41834 I=\[193.107.90.29\]:25 closed by DROP in ACL ... |
2020-02-05 00:45:17 |
142.93.218.248 | attackspambots | Unauthorized connection attempt detected from IP address 142.93.218.248 to port 2220 [J] |
2020-02-05 00:48:26 |