City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.36.100.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56869
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;216.36.100.139. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 11:13:32 CST 2025
;; MSG SIZE rcvd: 107
139.100.36.216.in-addr.arpa domain name pointer ip-216-36-100-139.chi.megapath.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.100.36.216.in-addr.arpa name = ip-216-36-100-139.chi.megapath.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 117.2.24.53 | attackbotsspam | Unauthorized connection attempt from IP address 117.2.24.53 on Port 445(SMB) |
2020-10-10 06:50:43 |
| 209.141.41.230 | attackspambots | ET SCAN NMAP -sS window 1024 |
2020-10-10 07:15:24 |
| 218.60.41.136 | attackbots | 2020-10-09 17:18:59.414419-0500 localhost sshd[32234]: Failed password for root from 218.60.41.136 port 56294 ssh2 |
2020-10-10 06:50:14 |
| 113.88.13.56 | attackspambots | Unauthorized connection attempt from IP address 113.88.13.56 on Port 445(SMB) |
2020-10-10 06:49:31 |
| 192.241.237.202 | attackbots |
|
2020-10-10 06:58:20 |
| 177.53.147.188 | attack | Unauthorized connection attempt from IP address 177.53.147.188 on Port 445(SMB) |
2020-10-10 06:58:39 |
| 103.62.155.237 | attack | php WP PHPmyadamin ABUSE blocked for 12h |
2020-10-10 07:21:08 |
| 165.22.68.84 | attackbotsspam | Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-10-09T22:35:19Z |
2020-10-10 06:59:38 |
| 14.29.126.53 | attackspambots | 2020-10-10T00:05:34.629008n23.at sshd[1860792]: Failed password for invalid user test from 14.29.126.53 port 33382 ssh2 2020-10-10T00:18:47.409617n23.at sshd[1871781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.126.53 user=sync 2020-10-10T00:18:48.901461n23.at sshd[1871781]: Failed password for sync from 14.29.126.53 port 38815 ssh2 ... |
2020-10-10 07:04:00 |
| 115.182.105.68 | attack | Oct 9 23:50:11 mavik sshd[18651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.182.105.68 user=gnats Oct 9 23:50:13 mavik sshd[18651]: Failed password for gnats from 115.182.105.68 port 57608 ssh2 Oct 9 23:53:34 mavik sshd[18758]: Invalid user marketing from 115.182.105.68 Oct 9 23:53:34 mavik sshd[18758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.182.105.68 Oct 9 23:53:36 mavik sshd[18758]: Failed password for invalid user marketing from 115.182.105.68 port 22855 ssh2 ... |
2020-10-10 07:04:58 |
| 201.77.7.219 | attackspam | Unauthorized connection attempt from IP address 201.77.7.219 on Port 445(SMB) |
2020-10-10 06:55:54 |
| 178.68.181.234 | attack | Unauthorized connection attempt from IP address 178.68.181.234 on Port 445(SMB) |
2020-10-10 06:56:44 |
| 114.141.150.60 | attackspam | 1433/tcp 1433/tcp [2020-10-08]2pkt |
2020-10-10 07:10:23 |
| 36.78.248.27 | attackspam | Unauthorized connection attempt from IP address 36.78.248.27 on Port 445(SMB) |
2020-10-10 07:10:48 |
| 85.106.196.90 | attack | Unauthorized connection attempt from IP address 85.106.196.90 on Port 445(SMB) |
2020-10-10 07:02:51 |