City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.64.66.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57292
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.64.66.116. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 22:08:07 CST 2025
;; MSG SIZE rcvd: 105
116.66.64.18.in-addr.arpa domain name pointer server-18-64-66-116.yvr52.r.cloudfront.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
116.66.64.18.in-addr.arpa name = server-18-64-66-116.yvr52.r.cloudfront.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 94.101.186.193 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-14 03:38:02 |
| 114.119.158.46 | attackspam | badbot |
2020-01-14 04:00:58 |
| 69.94.158.82 | attack | Jan 13 14:03:42 grey postfix/smtpd\[10330\]: NOQUEUE: reject: RCPT from stickup.swingthelamp.com\[69.94.158.82\]: 554 5.7.1 Service unavailable\; Client host \[69.94.158.82\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[69.94.158.82\]\; from=\ |
2020-01-14 03:32:23 |
| 110.138.195.170 | attack | Honeypot attack, port: 445, PTR: 170.subnet110-138-195.speedy.telkom.net.id. |
2020-01-14 04:07:59 |
| 211.95.11.142 | attackspambots | Unauthorized connection attempt detected from IP address 211.95.11.142 to port 2220 [J] |
2020-01-14 03:48:39 |
| 83.69.204.250 | attackspam | Unauthorized connection attempt from IP address 83.69.204.250 on Port 445(SMB) |
2020-01-14 04:03:58 |
| 49.88.112.113 | attackspam | Jan 13 09:36:59 eddieflores sshd\[30504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root Jan 13 09:37:01 eddieflores sshd\[30504\]: Failed password for root from 49.88.112.113 port 13184 ssh2 Jan 13 09:37:04 eddieflores sshd\[30504\]: Failed password for root from 49.88.112.113 port 13184 ssh2 Jan 13 09:37:06 eddieflores sshd\[30504\]: Failed password for root from 49.88.112.113 port 13184 ssh2 Jan 13 09:37:46 eddieflores sshd\[30556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113 user=root |
2020-01-14 03:44:20 |
| 5.9.246.145 | attackbots | Invalid user timemachine from 5.9.246.145 port 39762 |
2020-01-14 03:34:26 |
| 222.186.175.147 | attackspam | Jan 13 16:03:16 server sshd\[26798\]: Failed password for root from 222.186.175.147 port 11688 ssh2 Jan 13 16:03:17 server sshd\[26803\]: Failed password for root from 222.186.175.147 port 24808 ssh2 Jan 13 22:59:35 server sshd\[2782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147 user=root Jan 13 22:59:38 server sshd\[2782\]: Failed password for root from 222.186.175.147 port 59558 ssh2 Jan 13 22:59:41 server sshd\[2782\]: Failed password for root from 222.186.175.147 port 59558 ssh2 ... |
2020-01-14 03:59:53 |
| 81.10.72.111 | attackspam | 1578920598 - 01/13/2020 14:03:18 Host: 81.10.72.111/81.10.72.111 Port: 445 TCP Blocked |
2020-01-14 03:45:36 |
| 103.91.54.100 | attack | Unauthorized connection attempt detected from IP address 103.91.54.100 to port 2220 [J] |
2020-01-14 03:36:18 |
| 119.96.225.227 | attackspam | Unauthorized connection attempt detected from IP address 119.96.225.227 to port 2220 [J] |
2020-01-14 03:43:09 |
| 170.84.39.18 | attackbots | postfix (unknown user, SPF fail or relay access denied) |
2020-01-14 03:42:52 |
| 122.55.19.115 | attackspam | $f2bV_matches |
2020-01-14 03:53:59 |
| 114.119.139.96 | attackspambots | badbot |
2020-01-14 04:02:02 |