City: Traverse City
Region: Michigan
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.222.104.17
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32258
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;172.222.104.17. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:16:40 CST 2025
;; MSG SIZE rcvd: 107
17.104.222.172.in-addr.arpa domain name pointer syn-172-222-104-017.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
17.104.222.172.in-addr.arpa name = syn-172-222-104-017.res.spectrum.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 115.91.22.2 | attackspam | Unauthorized connection attempt from IP address 115.91.22.2 on Port 445(SMB) |
2020-08-14 20:22:45 |
| 124.105.69.36 | attack | Multiple SSH login attempts. |
2020-08-14 19:45:56 |
| 190.147.40.181 | attack | 1433/tcp [2020-08-14]1pkt |
2020-08-14 19:48:47 |
| 139.99.148.4 | attack | 139.99.148.4 - - [14/Aug/2020:12:21:41 +0100] "POST /wp-login.php HTTP/1.1" 200 1875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.99.148.4 - - [14/Aug/2020:12:21:45 +0100] "POST /wp-login.php HTTP/1.1" 200 1875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 139.99.148.4 - - [14/Aug/2020:12:21:50 +0100] "POST /wp-login.php HTTP/1.1" 200 1875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ... |
2020-08-14 20:21:14 |
| 14.236.58.222 | attackbots | 1597375926 - 08/14/2020 05:32:06 Host: 14.236.58.222/14.236.58.222 Port: 445 TCP Blocked |
2020-08-14 20:13:37 |
| 218.3.124.180 | attackbots | Port scan: Attack repeated for 24 hours |
2020-08-14 20:00:08 |
| 123.185.147.174 | attack | Unauthorized connection attempt from IP address 123.185.147.174 on Port 445(SMB) |
2020-08-14 19:52:59 |
| 194.165.129.165 | attackbots | 445/tcp [2020-08-14]1pkt |
2020-08-14 19:56:03 |
| 122.155.174.36 | attackspambots | Failed password for root from 122.155.174.36 port 60974 ssh2 |
2020-08-14 19:47:58 |
| 164.132.46.197 | attackbotsspam | Aug 14 13:34:48 abendstille sshd\[14373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.197 user=root Aug 14 13:34:50 abendstille sshd\[14373\]: Failed password for root from 164.132.46.197 port 34762 ssh2 Aug 14 13:39:44 abendstille sshd\[18861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.197 user=root Aug 14 13:39:46 abendstille sshd\[18861\]: Failed password for root from 164.132.46.197 port 45778 ssh2 Aug 14 13:44:31 abendstille sshd\[23029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.197 user=root ... |
2020-08-14 20:04:46 |
| 148.229.3.242 | attackspambots | Aug 14 08:18:46 XXXXXX sshd[9683]: Invalid user aaguera from 148.229.3.242 port 50189 |
2020-08-14 19:52:26 |
| 93.51.176.72 | attackbots | SSH Brute-Forcing (server1) |
2020-08-14 20:19:02 |
| 210.41.222.156 | attack | 1433/tcp [2020-08-14]1pkt |
2020-08-14 19:53:26 |
| 195.68.98.200 | attack | Aug 14 06:39:14 piServer sshd[29063]: Failed password for root from 195.68.98.200 port 49462 ssh2 Aug 14 06:43:47 piServer sshd[29482]: Failed password for root from 195.68.98.200 port 39050 ssh2 ... |
2020-08-14 19:39:12 |
| 103.16.168.226 | attackbotsspam | Unauthorized connection attempt from IP address 103.16.168.226 on Port 445(SMB) |
2020-08-14 19:43:21 |