City: unknown
Region: unknown
Country: Kazakhstan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.135.75.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30727
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.135.75.74. IN A
;; AUTHORITY SECTION:
. 177 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023021300 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 13 16:44:48 CST 2023
;; MSG SIZE rcvd: 104
74.75.135.2.in-addr.arpa domain name pointer 2.135.75.74.megaline.telecom.kz.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
74.75.135.2.in-addr.arpa name = 2.135.75.74.megaline.telecom.kz.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.152.182.136 | attackspam | Ignored robots.txt |
2020-03-20 21:28:26 |
| 106.13.9.7 | attack | SSH Brute Force |
2020-03-20 21:42:32 |
| 94.180.58.238 | attackspambots | Invalid user www from 94.180.58.238 port 43138 |
2020-03-20 21:00:50 |
| 46.38.145.5 | attackspam | Mar 20 14:14:38 srv01 postfix/smtpd\[10001\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 20 14:15:09 srv01 postfix/smtpd\[9967\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 20 14:15:39 srv01 postfix/smtpd\[24118\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 20 14:16:10 srv01 postfix/smtpd\[12850\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 20 14:16:41 srv01 postfix/smtpd\[9967\]: warning: unknown\[46.38.145.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-03-20 21:25:35 |
| 192.241.254.88 | attackbotsspam | " " |
2020-03-20 21:25:52 |
| 149.56.44.101 | attack | SSH Brute Force |
2020-03-20 21:37:19 |
| 185.175.93.3 | attackbotsspam | 03/20/2020-09:13:05.236128 185.175.93.3 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-20 21:29:01 |
| 49.213.214.210 | attack | Automatic report - Port Scan Attack |
2020-03-20 21:00:30 |
| 60.30.158.26 | attack | CMS (WordPress or Joomla) login attempt. |
2020-03-20 21:03:47 |
| 167.71.128.144 | attackspambots | SSH Brute Force |
2020-03-20 21:36:26 |
| 119.27.191.172 | attackbotsspam | SSH Brute Force |
2020-03-20 21:39:53 |
| 178.62.108.111 | attack | TCP port 1135: Scan and connection |
2020-03-20 21:20:39 |
| 212.237.30.205 | attackspam | Invalid user oikawa from 212.237.30.205 port 41318 |
2020-03-20 21:02:53 |
| 212.47.253.178 | attackspam | ... |
2020-03-20 21:21:01 |
| 140.238.153.125 | attackspam | SSH Brute Force |
2020-03-20 21:37:49 |