City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 174.221.213.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31722
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;174.221.213.14. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 19:51:07 CST 2025
;; MSG SIZE rcvd: 107
14.213.221.174.in-addr.arpa domain name pointer 14.sub-174-221-213.myvzw.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.213.221.174.in-addr.arpa name = 14.sub-174-221-213.myvzw.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
196.218.110.157 | attackspam | unauthorized connection attempt |
2020-01-09 14:28:43 |
180.96.62.201 | attackspam | unauthorized connection attempt |
2020-01-09 14:11:48 |
124.156.54.114 | attackbotsspam | unauthorized connection attempt |
2020-01-09 14:14:54 |
156.217.161.101 | attack | unauthorized connection attempt |
2020-01-09 14:54:43 |
185.176.7.129 | attack | unauthorized connection attempt |
2020-01-09 14:09:56 |
45.79.41.233 | attack | 2222/tcp 445/tcp 47808/tcp... [2019-11-09/2020-01-07]36pkt,33pt.(tcp) |
2020-01-09 14:24:02 |
179.56.72.95 | attackspam | unauthorized connection attempt |
2020-01-09 14:53:49 |
191.241.242.60 | attackbots | unauthorized connection attempt |
2020-01-09 14:29:25 |
222.186.30.248 | attackbotsspam | Jan 9 06:59:21 icinga sshd[55277]: Failed password for root from 222.186.30.248 port 38073 ssh2 Jan 9 06:59:25 icinga sshd[55277]: Failed password for root from 222.186.30.248 port 38073 ssh2 Jan 9 06:59:28 icinga sshd[55277]: Failed password for root from 222.186.30.248 port 38073 ssh2 ... |
2020-01-09 14:27:14 |
139.162.86.84 | attackbotsspam | unauthorized connection attempt |
2020-01-09 14:13:24 |
86.56.45.7 | attackbots | Honeypot attack, port: 5555, PTR: cable-86-56-45-7.cust.telecolumbus.net. |
2020-01-09 14:50:07 |
23.122.229.91 | attackbots | unauthorized connection attempt |
2020-01-09 14:08:29 |
49.204.226.72 | attackbots | unauthorized connection attempt |
2020-01-09 14:22:47 |
187.131.115.226 | attackspam | unauthorized connection attempt |
2020-01-09 14:52:59 |
112.73.82.139 | attackspam | Unauthorized connection attempt detected from IP address 112.73.82.139 to port 23 [T] |
2020-01-09 14:17:42 |