City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.170.204.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54627
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.170.204.50.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 03:41:23 CST 2025
;; MSG SIZE  rcvd: 107Host 50.204.170.164.in-addr.arpa not found: 2(SERVFAIL)
server can't find 164.170.204.50.in-addr.arpa: SERVFAIL| IP | Type | Details | Datetime | 
|---|---|---|---|
| 161.35.80.37 | attack | 20 attempts against mh-ssh on echoip | 2020-07-22 02:51:44 | 
| 46.148.135.187 | attackspam | Unauthorized connection attempt detected from IP address 46.148.135.187 to port 8080 [T] | 2020-07-22 03:06:48 | 
| 139.199.32.22 | attackspam | 2020-07-21T18:57:55+0200 Failed SSH Authentication/Brute Force Attack.(Server 2) | 2020-07-22 02:35:27 | 
| 52.231.165.27 | attackbots | Unauthorized connection attempt detected from IP address 52.231.165.27 to port 1433 | 2020-07-22 03:03:43 | 
| 49.207.128.156 | attackbotsspam | Unauthorized connection attempt detected from IP address 49.207.128.156 to port 445 [T] | 2020-07-22 03:06:24 | 
| 71.202.162.181 | attack | Brute force 52 attempts | 2020-07-22 03:01:28 | 
| 40.115.187.141 | attack | 2020-07-22 02:44:47 | |
| 219.144.51.130 | attackspambots | Unauthorized connection attempt detected from IP address 219.144.51.130 to port 445 [T] | 2020-07-22 02:49:03 | 
| 104.41.59.240 | attack | Unauthorized connection attempt detected from IP address 104.41.59.240 to port 1433 [T] | 2020-07-22 02:57:09 | 
| 222.186.175.23 | attackspambots | Jul 21 14:40:30 NPSTNNYC01T sshd[13009]: Failed password for root from 222.186.175.23 port 22898 ssh2 Jul 21 14:40:32 NPSTNNYC01T sshd[13009]: Failed password for root from 222.186.175.23 port 22898 ssh2 Jul 21 14:40:34 NPSTNNYC01T sshd[13009]: Failed password for root from 222.186.175.23 port 22898 ssh2 ... | 2020-07-22 02:48:07 | 
| 52.247.2.221 | attackspambots | Unauthorized connection attempt detected from IP address 52.247.2.221 to port 1433 [T] | 2020-07-22 03:03:12 | 
| 45.76.52.209 | attack | Unauthorized connection attempt detected from IP address 45.76.52.209 to port 80 [T] | 2020-07-22 03:07:13 | 
| 45.4.5.221 | attackbotsspam | 2020-07-21T07:23:50.685448hostname sshd[84992]: Failed password for invalid user talam from 45.4.5.221 port 37284 ssh2 ... | 2020-07-22 03:07:58 | 
| 198.204.240.90 | attack | Unauthorized connection attempt detected from IP address 198.204.240.90 to port 3389 | 2020-07-22 02:49:42 | 
| 168.138.145.173 | attackspambots | Unauthorized connection attempt detected from IP address 168.138.145.173 to port 445 [T] | 2020-07-22 02:32:41 |