City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.74.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55616
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.74.44. IN A
;; AUTHORITY SECTION:
. 404 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022062200 1800 900 604800 86400
;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 00:15:01 CST 2022
;; MSG SIZE rcvd: 106
44.74.229.169.in-addr.arpa domain name pointer fre-74-44.reshall.berkeley.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
44.74.229.169.in-addr.arpa name = fre-74-44.reshall.berkeley.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
218.154.207.70 | attackspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-07-15 07:12:24 |
60.165.219.14 | attack | Invalid user shiying from 60.165.219.14 port 32386 |
2020-07-15 07:20:44 |
202.83.17.137 | attack | Jul 14 11:29:55 propaganda sshd[41044]: Connection from 202.83.17.137 port 58518 on 10.0.0.160 port 22 rdomain "" Jul 14 11:29:56 propaganda sshd[41044]: Connection closed by 202.83.17.137 port 58518 [preauth] |
2020-07-15 07:15:39 |
85.186.208.179 | attackspambots | Automatic report - Banned IP Access |
2020-07-15 07:10:11 |
58.59.25.2 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-07-15 07:32:50 |
68.183.131.247 | attackspam | Invalid user mb from 68.183.131.247 port 48380 |
2020-07-15 07:24:35 |
189.212.112.150 | attackspam | [MK-VM1] Blocked by UFW |
2020-07-15 07:26:28 |
49.233.173.136 | attack | Invalid user admin from 49.233.173.136 port 51336 |
2020-07-15 07:24:52 |
92.222.72.234 | attack | SSH Invalid Login |
2020-07-15 07:13:07 |
115.124.64.126 | attackspambots | Invalid user transfer from 115.124.64.126 port 55028 |
2020-07-15 07:32:14 |
150.129.8.26 | attackspam | (mod_security) mod_security (id:218420) triggered by 150.129.8.26 (NL/Netherlands/-): 5 in the last 3600 secs |
2020-07-15 07:12:40 |
41.82.213.42 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-07-15 07:21:09 |
45.183.192.14 | attackspam | SSH Invalid Login |
2020-07-15 07:30:52 |
41.62.173.67 | attackspam | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-07-15 07:01:18 |
183.62.101.90 | attack | Jul 14 12:18:34 : SSH login attempts with invalid user |
2020-07-15 07:01:33 |