City: unknown
Region: unknown
Country: Austria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 176.66.148.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49919
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;176.66.148.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 04:00:57 CST 2025
;; MSG SIZE rcvd: 106
42.148.66.176.in-addr.arpa domain name pointer 176066148042.atmpu0053.highway.a1.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.148.66.176.in-addr.arpa name = 176066148042.atmpu0053.highway.a1.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.15.84.255 | attackbotsspam | Unauthorized connection attempt detected from IP address 51.15.84.255 to port 2220 [J] |
2020-01-14 20:16:35 |
| 147.158.174.15 | attackspambots | Unauthorized connection attempt detected from IP address 147.158.174.15 to port 4567 [J] |
2020-01-14 20:24:09 |
| 106.45.1.50 | attackspambots | Unauthorized connection attempt detected from IP address 106.45.1.50 to port 8899 [T] |
2020-01-14 20:40:05 |
| 1.173.119.149 | attack | Unauthorized connection attempt detected from IP address 1.173.119.149 to port 5555 [J] |
2020-01-14 20:18:18 |
| 49.88.112.77 | attack | Jan 14 08:54:11 firewall sshd[879]: Failed password for root from 49.88.112.77 port 59061 ssh2 Jan 14 08:54:13 firewall sshd[879]: Failed password for root from 49.88.112.77 port 59061 ssh2 Jan 14 08:54:15 firewall sshd[879]: Failed password for root from 49.88.112.77 port 59061 ssh2 ... |
2020-01-14 20:44:45 |
| 82.135.137.58 | attackspambots | Unauthorized connection attempt detected from IP address 82.135.137.58 to port 1433 [J] |
2020-01-14 20:31:40 |
| 220.132.177.208 | attackspam | Unauthorized connection attempt detected from IP address 220.132.177.208 to port 23 [J] |
2020-01-14 20:34:23 |
| 118.69.26.160 | attack | Unauthorized connection attempt detected from IP address 118.69.26.160 to port 23 [J] |
2020-01-14 20:11:55 |
| 86.108.110.116 | attackspam | Unauthorized connection attempt detected from IP address 86.108.110.116 to port 1433 [J] |
2020-01-14 20:15:00 |
| 112.66.101.189 | attackspam | Unauthorized connection attempt detected from IP address 112.66.101.189 to port 8080 [J] |
2020-01-14 20:28:12 |
| 104.248.34.192 | attack | Brute SSH |
2020-01-14 20:41:14 |
| 103.233.122.28 | attack | Unauthorized connection attempt detected from IP address 103.233.122.28 to port 23 [J] |
2020-01-14 20:29:31 |
| 109.189.91.238 | attackbots | Unauthorized connection attempt detected from IP address 109.189.91.238 to port 5555 [J] |
2020-01-14 20:28:46 |
| 181.15.95.58 | attackbots | Unauthorized connection attempt detected from IP address 181.15.95.58 to port 1433 [J] |
2020-01-14 20:22:27 |
| 77.42.97.112 | attack | Unauthorized connection attempt detected from IP address 77.42.97.112 to port 23 [J] |
2020-01-14 20:15:20 |