City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.212.95.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28784
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;199.212.95.2. IN A
;; AUTHORITY SECTION:
. 441 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 23:07:40 CST 2022
;; MSG SIZE rcvd: 105
2.95.212.199.in-addr.arpa domain name pointer utm.dyc.edu.
2.95.212.199.in-addr.arpa domain name pointer webutility.dyc.edu.
2.95.212.199.in-addr.arpa domain name pointer alumni.dyc.edu.
2.95.212.199.in-addr.arpa domain name pointer library.dyouville.edu.
2.95.212.199.in-addr.arpa domain name pointer ldps.dyc.edu.
2.95.212.199.in-addr.arpa domain name pointer ldps.dyouville.edu.
2.95.212.199.in-addr.arpa domain name pointer depts.dyouville.edu.
2.95.212.199.in-addr.arpa domain name pointer kavinokytheatre.com.
2.95.212.199.in-addr.arpa domain name pointer www.dyc.edu.
2.95.212.199.in-addr.arpa domain name pointer dyc.edu.
2.95.212.199.in-addr.arpa domain name pointer www.dyouville.edu.
2.95.212.199.in-addr.arpa domain name pointer library.dyc.edu.
2.95.212.199.in-addr.arpa domain name pointer dyouville.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
2.95.212.199.in-addr.arpa name = ldps.dyouville.edu.
2.95.212.199.in-addr.arpa name = depts.dyouville.edu.
2.95.212.199.in-addr.arpa name = kavinokytheatre.com.
2.95.212.199.in-addr.arpa name = www.dyc.edu.
2.95.212.199.in-addr.arpa name = dyc.edu.
2.95.212.199.in-addr.arpa name = www.dyouville.edu.
2.95.212.199.in-addr.arpa name = library.dyc.edu.
2.95.212.199.in-addr.arpa name = dyouville.edu.
2.95.212.199.in-addr.arpa name = utm.dyc.edu.
2.95.212.199.in-addr.arpa name = webutility.dyc.edu.
2.95.212.199.in-addr.arpa name = alumni.dyc.edu.
2.95.212.199.in-addr.arpa name = library.dyouville.edu.
2.95.212.199.in-addr.arpa name = ldps.dyc.edu.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 125.212.217.214 | attackspambots | Dec 12 10:11:18 debian-2gb-nbg1-2 kernel: \[24423417.429172\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=125.212.217.214 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=107 ID=50719 PROTO=TCP SPT=26200 DPT=8432 WINDOW=13617 RES=0x00 SYN URGP=0 |
2019-12-12 22:30:54 |
| 193.169.253.86 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-12-12 22:22:42 |
| 113.172.155.215 | attackbotsspam | Host Scan |
2019-12-12 21:54:43 |
| 5.135.121.238 | attackspam | Dec 12 14:38:08 srv206 sshd[14007]: Invalid user students from 5.135.121.238 ... |
2019-12-12 22:20:32 |
| 47.92.231.109 | attackbots | PHI,WP GET /wp-login.php |
2019-12-12 22:04:52 |
| 213.61.218.122 | attackspambots | Dec 12 13:59:10 MK-Soft-VM7 sshd[19687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.61.218.122 Dec 12 13:59:12 MK-Soft-VM7 sshd[19687]: Failed password for invalid user openhabian from 213.61.218.122 port 36570 ssh2 ... |
2019-12-12 22:11:38 |
| 118.24.81.234 | attackspambots | Dec 12 11:15:59 ns382633 sshd\[4000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.81.234 user=root Dec 12 11:16:01 ns382633 sshd\[4000\]: Failed password for root from 118.24.81.234 port 56486 ssh2 Dec 12 11:30:18 ns382633 sshd\[6783\]: Invalid user ronika from 118.24.81.234 port 52040 Dec 12 11:30:18 ns382633 sshd\[6783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.81.234 Dec 12 11:30:19 ns382633 sshd\[6783\]: Failed password for invalid user ronika from 118.24.81.234 port 52040 ssh2 |
2019-12-12 22:24:24 |
| 185.220.101.72 | attackbots | Automatic report - XMLRPC Attack |
2019-12-12 22:15:27 |
| 111.231.87.204 | attack | Dec 12 15:42:43 server sshd\[11662\]: Invalid user cncp from 111.231.87.204 Dec 12 15:42:43 server sshd\[11662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.87.204 Dec 12 15:42:44 server sshd\[11662\]: Failed password for invalid user cncp from 111.231.87.204 port 60944 ssh2 Dec 12 15:55:08 server sshd\[15387\]: Invalid user admin from 111.231.87.204 Dec 12 15:55:08 server sshd\[15387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.87.204 ... |
2019-12-12 22:30:26 |
| 115.159.214.247 | attack | Invalid user churcher from 115.159.214.247 port 53434 |
2019-12-12 21:52:22 |
| 103.94.56.152 | attack | Automatic report - Port Scan Attack |
2019-12-12 22:13:55 |
| 106.52.36.128 | attackbotsspam | Dec 12 14:34:38 jane sshd[13190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.36.128 Dec 12 14:34:40 jane sshd[13190]: Failed password for invalid user saindon from 106.52.36.128 port 34144 ssh2 ... |
2019-12-12 21:57:24 |
| 179.33.137.117 | attackbotsspam | Dec 12 14:23:47 MK-Soft-VM6 sshd[15087]: Failed password for root from 179.33.137.117 port 35866 ssh2 ... |
2019-12-12 22:12:07 |
| 118.24.201.168 | attackspam | Dec 12 02:20:35 plusreed sshd[24756]: Invalid user spider123 from 118.24.201.168 ... |
2019-12-12 22:30:08 |
| 134.209.9.244 | attackspambots | xmlrpc attack |
2019-12-12 22:08:26 |