City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 174.212.42.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48909
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;174.212.42.75. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 05:08:27 CST 2025
;; MSG SIZE rcvd: 106
75.42.212.174.in-addr.arpa domain name pointer 75.sub-174-212-42.myvzw.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
75.42.212.174.in-addr.arpa name = 75.sub-174-212-42.myvzw.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.12.91.209 | attackspam | May 12 07:51:25 meumeu sshd[8196]: Failed password for root from 106.12.91.209 port 53480 ssh2 May 12 07:57:13 meumeu sshd[8951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.91.209 May 12 07:57:15 meumeu sshd[8951]: Failed password for invalid user max from 106.12.91.209 port 34688 ssh2 ... |
2020-05-12 14:09:39 |
| 181.67.96.175 | attack | DATE:2020-05-12 05:53:30, IP:181.67.96.175, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2020-05-12 13:52:52 |
| 180.191.120.99 | attackbots | [MK-Root1] Blocked by UFW |
2020-05-12 14:27:15 |
| 118.25.18.30 | attack | Invalid user jonah from 118.25.18.30 port 51720 |
2020-05-12 14:12:51 |
| 171.97.15.177 | attackbotsspam | trying to access non-authorized port |
2020-05-12 13:55:22 |
| 119.98.19.231 | attack | port 23 |
2020-05-12 14:05:53 |
| 139.194.166.161 | attack | Connection by 139.194.166.161 on port: 139 got caught by honeypot at 5/12/2020 4:53:04 AM |
2020-05-12 14:07:32 |
| 14.177.250.20 | attackbots | Port probing on unauthorized port 445 |
2020-05-12 14:15:10 |
| 95.84.146.201 | attackspambots | May 12 01:54:39 vps46666688 sshd[15441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.84.146.201 May 12 01:54:41 vps46666688 sshd[15441]: Failed password for invalid user miller from 95.84.146.201 port 53520 ssh2 ... |
2020-05-12 13:48:17 |
| 212.73.136.72 | attackbotsspam | 2020-05-11T20:53:18.043135-07:00 suse-nuc sshd[22084]: Invalid user rama from 212.73.136.72 port 53468 ... |
2020-05-12 13:58:50 |
| 37.34.200.14 | attackspam | 2020-05-12T07:11:29.670225vps773228.ovh.net sshd[32718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.34.200.14 user=teamspeak 2020-05-12T07:11:31.393027vps773228.ovh.net sshd[32718]: Failed password for teamspeak from 37.34.200.14 port 44157 ssh2 2020-05-12T07:12:50.007461vps773228.ovh.net sshd[32730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.34.200.14 user=teamspeak 2020-05-12T07:12:52.518230vps773228.ovh.net sshd[32730]: Failed password for teamspeak from 37.34.200.14 port 11147 ssh2 2020-05-12T07:14:04.673113vps773228.ovh.net sshd[32744]: Invalid user test from 37.34.200.14 port 32862 ... |
2020-05-12 14:01:00 |
| 36.234.121.192 | attackbotsspam | 1589255609 - 05/12/2020 10:53:29 Host: 36-234-121-192.dynamic-ip.hinet.net/36.234.121.192 Port: 23 TCP Blocked ... |
2020-05-12 13:55:39 |
| 119.63.74.25 | attackbotsspam | Honeypot attack, port: 445, PTR: relay1.2s1n.com. |
2020-05-12 14:23:47 |
| 61.252.141.83 | attackspam | (sshd) Failed SSH login from 61.252.141.83 (KR/South Korea/-): 5 in the last 3600 secs |
2020-05-12 14:25:09 |
| 151.224.119.131 | attackspambots | port 23 |
2020-05-12 13:59:07 |