City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.212.95.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28784
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;199.212.95.2. IN A
;; AUTHORITY SECTION:
. 441 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 23:07:40 CST 2022
;; MSG SIZE rcvd: 105
2.95.212.199.in-addr.arpa domain name pointer utm.dyc.edu.
2.95.212.199.in-addr.arpa domain name pointer webutility.dyc.edu.
2.95.212.199.in-addr.arpa domain name pointer alumni.dyc.edu.
2.95.212.199.in-addr.arpa domain name pointer library.dyouville.edu.
2.95.212.199.in-addr.arpa domain name pointer ldps.dyc.edu.
2.95.212.199.in-addr.arpa domain name pointer ldps.dyouville.edu.
2.95.212.199.in-addr.arpa domain name pointer depts.dyouville.edu.
2.95.212.199.in-addr.arpa domain name pointer kavinokytheatre.com.
2.95.212.199.in-addr.arpa domain name pointer www.dyc.edu.
2.95.212.199.in-addr.arpa domain name pointer dyc.edu.
2.95.212.199.in-addr.arpa domain name pointer www.dyouville.edu.
2.95.212.199.in-addr.arpa domain name pointer library.dyc.edu.
2.95.212.199.in-addr.arpa domain name pointer dyouville.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
2.95.212.199.in-addr.arpa name = ldps.dyouville.edu.
2.95.212.199.in-addr.arpa name = depts.dyouville.edu.
2.95.212.199.in-addr.arpa name = kavinokytheatre.com.
2.95.212.199.in-addr.arpa name = www.dyc.edu.
2.95.212.199.in-addr.arpa name = dyc.edu.
2.95.212.199.in-addr.arpa name = www.dyouville.edu.
2.95.212.199.in-addr.arpa name = library.dyc.edu.
2.95.212.199.in-addr.arpa name = dyouville.edu.
2.95.212.199.in-addr.arpa name = utm.dyc.edu.
2.95.212.199.in-addr.arpa name = webutility.dyc.edu.
2.95.212.199.in-addr.arpa name = alumni.dyc.edu.
2.95.212.199.in-addr.arpa name = library.dyouville.edu.
2.95.212.199.in-addr.arpa name = ldps.dyc.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
61.155.234.38 | attackspambots | May 29 08:22:15 PorscheCustomer sshd[8997]: Failed password for root from 61.155.234.38 port 39706 ssh2 May 29 08:24:54 PorscheCustomer sshd[9099]: Failed password for root from 61.155.234.38 port 43602 ssh2 ... |
2020-05-29 19:25:46 |
3.6.225.115 | attackbots | $f2bV_matches |
2020-05-29 19:24:50 |
145.239.93.55 | attack | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-05-29 19:32:39 |
115.79.200.206 | attackspam | 20/5/28@23:47:42: FAIL: Alarm-Network address from=115.79.200.206 ... |
2020-05-29 19:35:22 |
201.17.130.156 | attackbots | no |
2020-05-29 19:36:48 |
110.252.34.93 | attackspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-05-29 19:30:01 |
185.206.201.155 | attackbots | Port probing on unauthorized port 8080 |
2020-05-29 19:29:31 |
31.207.35.68 | attackspam | ... |
2020-05-29 19:27:40 |
111.67.201.163 | attack | SSH brute-force attempt |
2020-05-29 19:22:00 |
122.116.184.63 | attackspam | IP 122.116.184.63 attacked honeypot on port: 23 at 5/29/2020 4:47:36 AM |
2020-05-29 19:37:22 |
99.240.8.69 | attackbots | Port probing on unauthorized port 2323 |
2020-05-29 19:12:39 |
164.52.106.199 | attackbots | Brute-Force,SSH |
2020-05-29 19:19:08 |
103.52.52.22 | attack | Invalid user christ from 103.52.52.22 port 57451 |
2020-05-29 19:44:28 |
51.38.186.244 | attackspam | May 29 10:54:51 localhost sshd[36195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=244.ip-51-38-186.eu user=root May 29 10:54:53 localhost sshd[36195]: Failed password for root from 51.38.186.244 port 40226 ssh2 May 29 10:58:18 localhost sshd[36599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=244.ip-51-38-186.eu user=root May 29 10:58:21 localhost sshd[36599]: Failed password for root from 51.38.186.244 port 44304 ssh2 May 29 11:01:40 localhost sshd[37037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=244.ip-51-38-186.eu user=root May 29 11:01:42 localhost sshd[37037]: Failed password for root from 51.38.186.244 port 48384 ssh2 ... |
2020-05-29 19:33:25 |
49.235.97.29 | attack | May 29 06:49:24 nextcloud sshd\[2681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.97.29 user=root May 29 06:49:26 nextcloud sshd\[2681\]: Failed password for root from 49.235.97.29 port 56011 ssh2 May 29 06:51:31 nextcloud sshd\[5619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.97.29 user=root |
2020-05-29 19:42:04 |