City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.12.75.206
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49684
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.12.75.206. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 19:39:19 CST 2025
;; MSG SIZE rcvd: 106
206.75.12.216.in-addr.arpa domain name pointer 216-12-75-206.lyn.mvl.ntelos.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
206.75.12.216.in-addr.arpa name = 216-12-75-206.lyn.mvl.ntelos.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 159.65.216.166 | attackbotsspam | SSH break in attempt ... |
2020-08-22 18:17:39 |
| 128.65.169.11 | attackspambots | Attempted connection to port 81. |
2020-08-22 17:50:22 |
| 49.233.14.115 | attack | Invalid user ftpuser from 49.233.14.115 port 54076 |
2020-08-22 18:18:20 |
| 120.192.21.232 | attackspam | Invalid user it from 120.192.21.232 port 50790 |
2020-08-22 18:03:46 |
| 85.105.212.240 | attackspambots | Attempted connection to port 23. |
2020-08-22 18:10:50 |
| 106.54.48.29 | attack | Aug 22 09:25:58 Invalid user kiki from 106.54.48.29 port 44272 |
2020-08-22 18:04:09 |
| 162.243.128.133 | attackbotsspam | " " |
2020-08-22 17:56:38 |
| 145.131.6.21 | attackbotsspam | $f2bV_matches |
2020-08-22 18:03:15 |
| 218.75.210.46 | attackbots | frenzy |
2020-08-22 17:49:48 |
| 110.249.117.124 | attackspam | Unauthorised access (Aug 22) SRC=110.249.117.124 LEN=40 TTL=46 ID=65269 TCP DPT=8080 WINDOW=55740 SYN Unauthorised access (Aug 20) SRC=110.249.117.124 LEN=40 TTL=46 ID=51366 TCP DPT=8080 WINDOW=55740 SYN |
2020-08-22 18:06:33 |
| 24.113.123.131 | attackspambots | Attempted connection to port 445. |
2020-08-22 17:47:48 |
| 2.180.17.1 | attackbots | Attempted connection to port 23. |
2020-08-22 18:14:24 |
| 104.224.128.61 | attackspam | Invalid user test from 104.224.128.61 port 44792 |
2020-08-22 18:13:52 |
| 114.104.134.120 | attack | Aug 22 07:36:34 srv01 postfix/smtpd\[25642\]: warning: unknown\[114.104.134.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 22 07:46:53 srv01 postfix/smtpd\[5708\]: warning: unknown\[114.104.134.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 22 07:47:05 srv01 postfix/smtpd\[5708\]: warning: unknown\[114.104.134.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 22 07:47:21 srv01 postfix/smtpd\[5708\]: warning: unknown\[114.104.134.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Aug 22 07:47:41 srv01 postfix/smtpd\[5708\]: warning: unknown\[114.104.134.120\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-08-22 18:21:22 |
| 37.187.125.32 | attackspambots | Bruteforce detected by fail2ban |
2020-08-22 17:59:19 |