City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.150.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42459
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.150.141. IN A
;; AUTHORITY SECTION:
. 422 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022063001 1800 900 604800 86400
;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 01 18:10:03 CST 2022
;; MSG SIZE rcvd: 108
141.150.229.169.in-addr.arpa domain name pointer barr-534-002.ethnic.berkeley.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
141.150.229.169.in-addr.arpa name = barr-534-002.ethnic.berkeley.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
118.232.163.200 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 02:29:53,506 INFO [shellcode_manager] (118.232.163.200) no match, writing hexdump (49e90b2a40fd8cfbf3e002d3c44ccc90 :2393089) - MS17010 (EternalBlue) |
2019-07-03 14:50:36 |
183.249.242.103 | attackbotsspam | ssh failed login |
2019-07-03 14:48:41 |
132.232.32.54 | attackspam | $f2bV_matches |
2019-07-03 14:39:13 |
196.229.145.160 | attackspambots | PHI,WP GET /wp-login.php |
2019-07-03 14:47:40 |
190.1.57.243 | attackbotsspam | Hit on /wp-login.php |
2019-07-03 14:20:48 |
121.97.68.172 | attackspambots | 2323/tcp 23/tcp... [2019-05-13/07-03]6pkt,2pt.(tcp) |
2019-07-03 14:55:39 |
46.101.253.47 | attackbots | Jul 3 07:08:07 ms-srv sshd[9567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.253.47 user=root Jul 3 07:08:09 ms-srv sshd[9567]: Failed password for invalid user root from 46.101.253.47 port 52496 ssh2 |
2019-07-03 14:33:48 |
45.55.12.248 | attackspam | Automatic report - Web App Attack |
2019-07-03 14:18:46 |
60.211.84.180 | attack | 5500/tcp 5500/tcp 5500/tcp... [2019-06-19/07-03]6pkt,1pt.(tcp) |
2019-07-03 14:30:06 |
45.254.25.201 | attack | Traffic related to ChinaChopper.Gen Command and Control detected |
2019-07-03 14:47:01 |
217.112.128.214 | attackspambots | Postfix DNSBL listed. Trying to send SPAM. |
2019-07-03 14:29:38 |
125.231.67.222 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 02:30:46,428 INFO [amun_request_handler] PortScan Detected on Port: 445 (125.231.67.222) |
2019-07-03 14:07:37 |
222.169.186.242 | attack | Brute force attempt |
2019-07-03 14:34:19 |
176.115.195.35 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 02:30:30,210 INFO [shellcode_manager] (176.115.195.35) no match, writing hexdump (608e58c99acb1d652967e5eacbe68603 :2093472) - MS17010 (EternalBlue) |
2019-07-03 14:34:56 |
60.199.223.17 | attackspam | 445/tcp 445/tcp 445/tcp... [2019-06-18/07-03]8pkt,1pt.(tcp) |
2019-07-03 14:33:16 |