City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.229.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.229.49. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022062202 1800 900 604800 86400
;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 06:09:39 CST 2022
;; MSG SIZE rcvd: 107
49.229.229.169.in-addr.arpa domain name pointer fixed-169-229-229-49.ucbso.berkeley.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
49.229.229.169.in-addr.arpa name = fixed-169-229-229-49.ucbso.berkeley.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
51.254.46.236 | attackbots | Fail2Ban Ban Triggered |
2020-09-28 16:48:55 |
92.112.124.142 | attackbotsspam | 445/tcp [2020-09-27]1pkt |
2020-09-28 17:10:24 |
42.235.69.155 | attackspam | 8080/tcp 8080/tcp 8080/tcp [2020-09-27]3pkt |
2020-09-28 17:23:30 |
121.62.57.85 | attackbotsspam | failed_logins |
2020-09-28 17:07:02 |
193.111.79.81 | attackspambots | 193.111.79.81 |
2020-09-28 17:21:16 |
149.56.118.205 | attackbots | www.goldgier.de 149.56.118.205 [28/Sep/2020:10:42:42 +0200] "POST /wp-login.php HTTP/1.1" 200 8763 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" www.goldgier.de 149.56.118.205 [28/Sep/2020:10:42:43 +0200] "POST /wp-login.php HTTP/1.1" 200 8764 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-09-28 17:04:14 |
173.175.156.105 | attackbotsspam | 59354/udp [2020-09-27]1pkt |
2020-09-28 16:55:03 |
171.247.218.45 | attackbots | 445/tcp [2020-09-27]1pkt |
2020-09-28 17:08:01 |
213.230.107.202 | attack | Sep 28 09:55:29 sshgateway sshd\[20565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.230.107.202 user=root Sep 28 09:55:30 sshgateway sshd\[20565\]: Failed password for root from 213.230.107.202 port 19829 ssh2 Sep 28 10:00:33 sshgateway sshd\[20598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.230.107.202 user=root |
2020-09-28 16:43:07 |
85.209.0.104 | attack | 22/tcp 22/tcp 22/tcp... [2020-09-27]4pkt,1pt.(tcp) |
2020-09-28 16:52:25 |
192.81.209.167 | attack | Brute%20Force%20SSH |
2020-09-28 16:47:27 |
27.72.100.231 | attack | 445/tcp [2020-09-27]1pkt |
2020-09-28 17:06:12 |
94.191.100.11 | attackbotsspam | SSH/22 MH Probe, BF, Hack - |
2020-09-28 16:51:00 |
149.28.102.92 | attackbotsspam | Website login hacking attempts. |
2020-09-28 17:24:04 |
179.95.147.35 | attackspam | Automatic report - Port Scan Attack |
2020-09-28 16:45:02 |