City: Stockton
Region: California
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.9.92.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16139
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;172.9.92.69. IN A
;; AUTHORITY SECTION:
. 361 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023022500 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 25 14:53:01 CST 2023
;; MSG SIZE rcvd: 104
69.92.9.172.in-addr.arpa domain name pointer 172-9-92-69.lightspeed.frokca.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
69.92.9.172.in-addr.arpa name = 172-9-92-69.lightspeed.frokca.sbcglobal.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 213.32.111.52 | attackspambots | Invalid user liang from 213.32.111.52 port 45698 |
2020-05-15 17:34:31 |
| 1.20.203.91 | attackbotsspam | Port scanning |
2020-05-15 17:24:17 |
| 82.64.9.197 | attackbotsspam | Invalid user talita from 82.64.9.197 port 52744 |
2020-05-15 17:40:01 |
| 112.134.5.170 | attackbotsspam | Vulnerability Scanning |
2020-05-15 17:20:26 |
| 139.59.57.140 | attack | May 15 12:23:43 pkdns2 sshd\[24384\]: Invalid user db from 139.59.57.140May 15 12:23:46 pkdns2 sshd\[24384\]: Failed password for invalid user db from 139.59.57.140 port 42970 ssh2May 15 12:28:00 pkdns2 sshd\[24589\]: Invalid user openproject from 139.59.57.140May 15 12:28:02 pkdns2 sshd\[24589\]: Failed password for invalid user openproject from 139.59.57.140 port 52106 ssh2May 15 12:32:19 pkdns2 sshd\[24809\]: Invalid user demo from 139.59.57.140May 15 12:32:21 pkdns2 sshd\[24809\]: Failed password for invalid user demo from 139.59.57.140 port 33014 ssh2 ... |
2020-05-15 17:41:34 |
| 91.132.60.74 | attackbots | 2020-05-15 11:43:50,871 fail2ban.actions: WARNING [ssh] Ban 91.132.60.74 |
2020-05-15 17:45:24 |
| 47.107.85.50 | attackspam | $f2bV_matches |
2020-05-15 17:38:47 |
| 106.13.174.171 | attackbotsspam | Automatic report BANNED IP |
2020-05-15 17:25:53 |
| 113.128.105.190 | attackbotsspam | Unauthorized connection attempt detected from IP address 113.128.105.190 to port 1080 [T] |
2020-05-15 17:35:18 |
| 210.77.127.169 | attack | Unauthorized SSH login attempts |
2020-05-15 17:24:42 |
| 5.9.140.242 | attackspam | 20 attempts against mh-misbehave-ban on comet |
2020-05-15 17:44:20 |
| 110.80.155.247 | attack | China's GFW probe |
2020-05-15 17:37:04 |
| 223.166.74.162 | attackspam | China's GFW probe |
2020-05-15 17:33:51 |
| 41.223.4.155 | attackspam | Invalid user ftptest from 41.223.4.155 port 54568 |
2020-05-15 17:21:19 |
| 27.224.137.5 | attack | China's GFW probe |
2020-05-15 17:37:59 |