City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.94.29.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19745
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;192.94.29.29. IN A
;; AUTHORITY SECTION:
. 470 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 21:50:48 CST 2022
;; MSG SIZE rcvd: 105
29.29.94.192.in-addr.arpa domain name pointer wat.epcc.edu.
29.29.94.192.in-addr.arpa domain name pointer go.epcc.edu.
29.29.94.192.in-addr.arpa domain name pointer elp-192-94-29-29.epcc.edu.
29.29.94.192.in-addr.arpa domain name pointer epcc.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
29.29.94.192.in-addr.arpa name = epcc.edu.
29.29.94.192.in-addr.arpa name = wat.epcc.edu.
29.29.94.192.in-addr.arpa name = go.epcc.edu.
29.29.94.192.in-addr.arpa name = elp-192-94-29-29.epcc.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
183.81.18.114 | attackbotsspam | Unauthorized connection attempt detected from IP address 183.81.18.114 to port 23 |
2019-12-31 06:39:29 |
112.49.240.1 | attackbotsspam | Unauthorized connection attempt detected from IP address 112.49.240.1 to port 8080 |
2019-12-31 06:52:20 |
183.80.56.222 | attackbots | Unauthorized connection attempt detected from IP address 183.80.56.222 to port 23 |
2019-12-31 06:39:45 |
139.199.71.117 | attackspambots | 9200/tcp 8080/tcp 7002/tcp... [2019-12-02/30]14pkt,6pt.(tcp) |
2019-12-31 06:42:17 |
171.120.159.28 | attackspambots | Unauthorized connection attempt detected from IP address 171.120.159.28 to port 8081 |
2019-12-31 06:40:55 |
61.136.101.103 | attackbotsspam | Unauthorized connection attempt detected from IP address 61.136.101.103 to port 1433 |
2019-12-31 06:32:20 |
123.160.232.38 | attackspambots | Unauthorized connection attempt detected from IP address 123.160.232.38 to port 8082 |
2019-12-31 06:24:52 |
123.163.114.168 | attackbotsspam | Unauthorized connection attempt detected from IP address 123.163.114.168 to port 8081 |
2019-12-31 06:45:03 |
117.48.209.85 | attackbotsspam | Dec 30 21:11:43 MK-Soft-VM5 sshd[28372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.209.85 Dec 30 21:11:45 MK-Soft-VM5 sshd[28372]: Failed password for invalid user tbolivar from 117.48.209.85 port 47682 ssh2 ... |
2019-12-31 06:28:47 |
27.224.137.155 | attackspam | Unauthorized connection attempt detected from IP address 27.224.137.155 to port 2053 |
2019-12-31 06:34:39 |
117.14.149.239 | attackbots | Unauthorized connection attempt detected from IP address 117.14.149.239 to port 2053 |
2019-12-31 06:29:30 |
222.90.82.74 | attackbots | Unauthorized connection attempt detected from IP address 222.90.82.74 to port 23 |
2019-12-31 06:35:44 |
171.36.130.140 | attackspam | Unauthorized connection attempt detected from IP address 171.36.130.140 to port 2082 |
2019-12-31 06:41:15 |
218.201.84.58 | attackbotsspam | Unauthorized connection attempt detected from IP address 218.201.84.58 to port 23 |
2019-12-31 06:18:22 |
221.13.12.204 | attack | Unauthorized connection attempt detected from IP address 221.13.12.204 to port 2052 |
2019-12-31 06:36:59 |