City: Barrigada Village
Region: unknown
Country: Guam
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.123.200.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;168.123.200.70. IN A
;; AUTHORITY SECTION:
. 531 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023050501 1800 900 604800 86400
;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 06 08:33:04 CST 2023
;; MSG SIZE rcvd: 107
70.200.123.168.in-addr.arpa domain name pointer cals-70.uog.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
70.200.123.168.in-addr.arpa name = cals-70.uog.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
164.132.225.66 | attackspambots | Unauthorized connection attempt detected from IP address 164.132.225.66 to port 2220 [J] |
2020-02-03 09:25:25 |
185.53.88.78 | attack | SIPVicious Scanner Detection |
2020-02-03 09:37:57 |
49.234.67.243 | attack | Unauthorized connection attempt detected from IP address 49.234.67.243 to port 2220 [J] |
2020-02-03 09:37:27 |
222.187.200.229 | attackspam | Feb 2 22:51:49 marvibiene sshd[24275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.187.200.229 user=root Feb 2 22:51:50 marvibiene sshd[24275]: Failed password for root from 222.187.200.229 port 49328 ssh2 Feb 2 23:27:56 marvibiene sshd[24687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.187.200.229 user=root Feb 2 23:27:58 marvibiene sshd[24687]: Failed password for root from 222.187.200.229 port 55804 ssh2 ... |
2020-02-03 10:01:08 |
58.249.97.190 | attack | port scan and connect, tcp 25 (smtp) |
2020-02-03 09:33:10 |
223.111.144.152 | attack | Feb 3 01:29:16 MK-Soft-VM8 sshd[21219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.111.144.152 Feb 3 01:29:18 MK-Soft-VM8 sshd[21219]: Failed password for invalid user litvinenko from 223.111.144.152 port 41260 ssh2 ... |
2020-02-03 10:11:17 |
67.207.88.180 | attackspam | Feb 2 15:57:54 hpm sshd\[8956\]: Invalid user aspasov from 67.207.88.180 Feb 2 15:57:54 hpm sshd\[8956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.88.180 Feb 2 15:57:56 hpm sshd\[8956\]: Failed password for invalid user aspasov from 67.207.88.180 port 47096 ssh2 Feb 2 16:01:05 hpm sshd\[9106\]: Invalid user gsk from 67.207.88.180 Feb 2 16:01:05 hpm sshd\[9106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.88.180 |
2020-02-03 10:03:00 |
80.211.232.135 | attackbots | Unauthorized connection attempt detected from IP address 80.211.232.135 to port 2220 [J] |
2020-02-03 10:01:55 |
222.80.125.103 | attack | Unauthorized connection attempt detected from IP address 222.80.125.103 to port 3389 [T] |
2020-02-03 10:04:56 |
192.241.235.17 | attackspambots | Port 1433 Scan |
2020-02-03 09:50:50 |
106.12.156.236 | attackspam | Feb 3 02:21:33 silence02 sshd[8067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.156.236 Feb 3 02:21:35 silence02 sshd[8067]: Failed password for invalid user rutan from 106.12.156.236 port 37336 ssh2 Feb 3 02:24:50 silence02 sshd[8373]: Failed password for root from 106.12.156.236 port 33790 ssh2 |
2020-02-03 09:41:07 |
212.47.241.15 | attackspambots | $f2bV_matches |
2020-02-03 10:09:14 |
222.186.42.75 | attackbots | Feb 3 01:32:56 localhost sshd\[26007\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.75 user=root Feb 3 01:32:58 localhost sshd\[26007\]: Failed password for root from 222.186.42.75 port 41132 ssh2 Feb 3 01:33:00 localhost sshd\[26007\]: Failed password for root from 222.186.42.75 port 41132 ssh2 ... |
2020-02-03 09:35:43 |
163.172.204.185 | attackbotsspam | Unauthorized connection attempt detected from IP address 163.172.204.185 to port 2220 [J] |
2020-02-03 09:56:49 |
18.220.144.125 | attack | Jan 28 06:13:16 neweola sshd[304]: Invalid user yamajhostnameh from 18.220.144.125 port 37750 Jan 28 06:13:16 neweola sshd[304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.220.144.125 Jan 28 06:13:18 neweola sshd[304]: Failed password for invalid user yamajhostnameh from 18.220.144.125 port 37750 ssh2 Jan 28 06:13:18 neweola sshd[304]: Received disconnect from 18.220.144.125 port 37750:11: Bye Bye [preauth] Jan 28 06:13:18 neweola sshd[304]: Disconnected from invalid user yamajhostnameh 18.220.144.125 port 37750 [preauth] Jan 28 06:19:16 neweola sshd[698]: Invalid user ekana from 18.220.144.125 port 58666 Jan 28 06:19:16 neweola sshd[698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.220.144.125 Jan 28 06:19:18 neweola sshd[698]: Failed password for invalid user ekana from 18.220.144.125 port 58666 ssh2 Jan 28 06:19:18 neweola sshd[698]: Received disconnect from 18.220.144.12........ ------------------------------- |
2020-02-03 10:08:43 |