City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.1.167.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61264
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;4.1.167.145. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:46:26 CST 2025
;; MSG SIZE rcvd: 104
145.167.1.4.in-addr.arpa domain name pointer lag-39-256-99.bear1.phoenix1.level3.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
145.167.1.4.in-addr.arpa name = lag-39-256-99.bear1.phoenix1.level3.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 69.6.31.150 | attack | Unauthorized connection attempt detected from IP address 69.6.31.150 to port 80 [J] |
2020-01-20 20:03:47 |
| 77.42.88.70 | attackspam | Unauthorized connection attempt detected from IP address 77.42.88.70 to port 23 [J] |
2020-01-20 20:23:03 |
| 71.105.176.127 | attackbotsspam | Unauthorized connection attempt detected from IP address 71.105.176.127 to port 81 [J] |
2020-01-20 20:23:37 |
| 201.150.102.180 | attack | Unauthorized connection attempt detected from IP address 201.150.102.180 to port 4567 [J] |
2020-01-20 20:27:49 |
| 220.133.9.9 | attackbots | Unauthorized connection attempt detected from IP address 220.133.9.9 to port 23 [J] |
2020-01-20 20:09:02 |
| 188.241.47.43 | attackbots | Unauthorized connection attempt detected from IP address 188.241.47.43 to port 80 [J] |
2020-01-20 20:29:24 |
| 78.133.59.41 | attackbots | Unauthorized connection attempt detected from IP address 78.133.59.41 to port 8000 [J] |
2020-01-20 20:22:26 |
| 186.248.107.10 | attackbotsspam | Unauthorized connection attempt detected from IP address 186.248.107.10 to port 8080 [J] |
2020-01-20 20:11:58 |
| 177.139.194.62 | attackspambots | Unauthorized connection attempt detected from IP address 177.139.194.62 to port 2220 [J] |
2020-01-20 20:13:11 |
| 62.234.148.231 | attack | Unauthorized connection attempt detected from IP address 62.234.148.231 to port 2220 [J] |
2020-01-20 20:04:45 |
| 59.126.135.100 | attackspambots | Unauthorized connection attempt detected from IP address 59.126.135.100 to port 23 [J] |
2020-01-20 20:24:09 |
| 123.10.86.20 | attack | Unauthorized connection attempt detected from IP address 123.10.86.20 to port 8080 [J] |
2020-01-20 20:16:16 |
| 109.251.68.112 | attackbotsspam | Jan 20 12:02:48 ns382633 sshd\[28156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.251.68.112 user=root Jan 20 12:02:50 ns382633 sshd\[28156\]: Failed password for root from 109.251.68.112 port 45144 ssh2 Jan 20 12:22:30 ns382633 sshd\[31827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.251.68.112 user=root Jan 20 12:22:32 ns382633 sshd\[31827\]: Failed password for root from 109.251.68.112 port 33992 ssh2 Jan 20 12:26:24 ns382633 sshd\[32630\]: Invalid user Admin from 109.251.68.112 port 36396 Jan 20 12:26:24 ns382633 sshd\[32630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.251.68.112 |
2020-01-20 20:19:57 |
| 89.233.219.204 | attackspambots | Unauthorized connection attempt detected from IP address 89.233.219.204 to port 23 [J] |
2020-01-20 20:39:35 |
| 195.12.24.50 | attackspambots | Unauthorized connection attempt detected from IP address 195.12.24.50 to port 8080 [J] |
2020-01-20 20:10:47 |