City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 174.22.142.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31768
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;174.22.142.89. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 14:40:07 CST 2025
;; MSG SIZE rcvd: 106
89.142.22.174.in-addr.arpa domain name pointer 174-22-142-89.clsp.qwest.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
89.142.22.174.in-addr.arpa name = 174-22-142-89.clsp.qwest.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
190.85.65.236 | attackspambots | Oct 6 12:41:59 scw-gallant-ride sshd[6163]: Failed password for root from 190.85.65.236 port 40526 ssh2 |
2020-10-07 02:12:03 |
112.248.130.173 | attackspam | 23/tcp [2020-10-05]1pkt |
2020-10-07 02:23:02 |
222.186.15.62 | attack | Oct 6 20:14:05 eventyay sshd[19497]: Failed password for root from 222.186.15.62 port 44996 ssh2 Oct 6 20:14:15 eventyay sshd[19499]: Failed password for root from 222.186.15.62 port 33564 ssh2 ... |
2020-10-07 02:16:51 |
202.148.24.214 | attackbots | 23/tcp [2020-10-05]1pkt |
2020-10-07 02:30:38 |
125.43.88.67 | attackspambots | 2323/tcp [2020-10-05]1pkt |
2020-10-07 02:26:00 |
187.162.28.163 | attackspambots | 23/tcp 23/tcp 23/tcp... [2020-10-05]4pkt,1pt.(tcp) |
2020-10-07 02:29:46 |
140.143.19.237 | attackspambots | Oct 6 11:33:59 router sshd[20439]: Failed password for root from 140.143.19.237 port 52966 ssh2 Oct 6 11:37:41 router sshd[20460]: Failed password for root from 140.143.19.237 port 35880 ssh2 ... |
2020-10-07 02:37:56 |
190.137.19.250 | attackbots | 445/tcp [2020-10-05]1pkt |
2020-10-07 02:41:27 |
77.81.144.34 | attack | 445/tcp [2020-10-05]1pkt |
2020-10-07 02:18:18 |
185.191.171.35 | attackspambots | Automatic report - Banned IP Access |
2020-10-07 02:11:10 |
122.194.229.59 | attackspambots | Oct 7 01:41:45 itv-usvr-02 sshd[24529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.194.229.59 user=root Oct 7 01:41:47 itv-usvr-02 sshd[24529]: Failed password for root from 122.194.229.59 port 4968 ssh2 |
2020-10-07 02:44:59 |
103.216.115.38 | attack | Brute%20Force%20SSH |
2020-10-07 02:39:04 |
186.88.92.175 | attack | 1601930292 - 10/05/2020 22:38:12 Host: 186.88.92.175/186.88.92.175 Port: 445 TCP Blocked |
2020-10-07 02:40:22 |
167.248.133.16 | attackspambots | Port Scan/VNC login attempt ... |
2020-10-07 02:22:04 |
59.33.37.158 | attack | Icarus honeypot on github |
2020-10-07 02:26:43 |