City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.2.68.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43132
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;47.2.68.13. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 21:31:49 CST 2025
;; MSG SIZE rcvd: 103
13.68.2.47.in-addr.arpa domain name pointer syn-047-002-068-013.inf.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
13.68.2.47.in-addr.arpa name = syn-047-002-068-013.inf.spectrum.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 212.102.33.204 | attackspambots | 0,53-03/04 [bc01/m75] PostRequest-Spammer scoring: Lusaka01 |
2020-07-08 20:55:07 |
| 119.45.17.25 | attackbotsspam | Jul 8 14:18:35 [host] sshd[13854]: Invalid user t Jul 8 14:18:35 [host] sshd[13854]: pam_unix(sshd: Jul 8 14:18:37 [host] sshd[13854]: Failed passwor |
2020-07-08 20:24:14 |
| 192.241.212.132 | attack | [Wed Jul 01 01:01:22 2020] - DDoS Attack From IP: 192.241.212.132 Port: 49463 |
2020-07-08 20:23:47 |
| 181.40.122.2 | attack | 2020-07-08T12:16:26.875388shield sshd\[23818\]: Invalid user lothar from 181.40.122.2 port 14906 2020-07-08T12:16:26.879899shield sshd\[23818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.122.2 2020-07-08T12:16:28.828568shield sshd\[23818\]: Failed password for invalid user lothar from 181.40.122.2 port 14906 ssh2 2020-07-08T12:24:18.167763shield sshd\[26364\]: Invalid user wrf from 181.40.122.2 port 11685 2020-07-08T12:24:18.170578shield sshd\[26364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.122.2 |
2020-07-08 20:30:51 |
| 167.71.196.176 | attackbots | 2020-07-08T11:48:35+0000 Failed SSH Authentication/Brute Force Attack. (Server 6) |
2020-07-08 20:20:22 |
| 159.89.161.2 | attackspambots | 17226/tcp 326/tcp 19196/tcp... [2020-06-22/07-08]55pkt,19pt.(tcp) |
2020-07-08 20:31:07 |
| 193.169.253.27 | attackspam | Jul 8 13:11:04 heicom postfix/smtpd\[13094\]: warning: unknown\[193.169.253.27\]: SASL LOGIN authentication failed: authentication failure Jul 8 13:23:26 heicom postfix/smtpd\[13077\]: warning: unknown\[193.169.253.27\]: SASL LOGIN authentication failed: authentication failure Jul 8 13:35:49 heicom postfix/smtpd\[14932\]: warning: unknown\[193.169.253.27\]: SASL LOGIN authentication failed: authentication failure Jul 8 13:48:11 heicom postfix/smtpd\[15141\]: warning: unknown\[193.169.253.27\]: SASL LOGIN authentication failed: authentication failure ... |
2020-07-08 21:01:34 |
| 200.45.176.156 | attackbots | SMB Server BruteForce Attack |
2020-07-08 21:01:04 |
| 207.154.229.50 | attack | Jul 8 13:49:11 prox sshd[14157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.50 Jul 8 13:49:14 prox sshd[14157]: Failed password for invalid user ftp from 207.154.229.50 port 44778 ssh2 |
2020-07-08 20:27:33 |
| 218.10.239.96 | attack | 32131/tcp 25396/tcp 24526/tcp... [2020-06-22/07-07]55pkt,19pt.(tcp) |
2020-07-08 20:58:50 |
| 142.93.137.144 | attackspam | Jul 8 12:30:02 plex-server sshd[750338]: Invalid user matthew from 142.93.137.144 port 32926 Jul 8 12:30:02 plex-server sshd[750338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.137.144 Jul 8 12:30:02 plex-server sshd[750338]: Invalid user matthew from 142.93.137.144 port 32926 Jul 8 12:30:03 plex-server sshd[750338]: Failed password for invalid user matthew from 142.93.137.144 port 32926 ssh2 Jul 8 12:32:55 plex-server sshd[750578]: Invalid user padir from 142.93.137.144 port 58716 ... |
2020-07-08 20:49:33 |
| 200.116.175.40 | attackbots | Jul 8 13:48:26 tuxlinux sshd[19839]: Invalid user account from 200.116.175.40 port 11106 Jul 8 13:48:26 tuxlinux sshd[19839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.175.40 Jul 8 13:48:26 tuxlinux sshd[19839]: Invalid user account from 200.116.175.40 port 11106 Jul 8 13:48:26 tuxlinux sshd[19839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.175.40 Jul 8 13:48:26 tuxlinux sshd[19839]: Invalid user account from 200.116.175.40 port 11106 Jul 8 13:48:26 tuxlinux sshd[19839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.175.40 Jul 8 13:48:29 tuxlinux sshd[19839]: Failed password for invalid user account from 200.116.175.40 port 11106 ssh2 ... |
2020-07-08 20:32:46 |
| 45.134.179.238 | attackbots | 07/08/2020-07:48:14.095545 45.134.179.238 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-07-08 20:58:24 |
| 192.241.226.87 | attackbotsspam | [Sat Jun 27 12:58:48 2020] - DDoS Attack From IP: 192.241.226.87 Port: 46958 |
2020-07-08 20:53:04 |
| 106.12.151.250 | attackbotsspam | Jul 8 13:41:02 vserver sshd\[32597\]: Invalid user lijiang from 106.12.151.250Jul 8 13:41:04 vserver sshd\[32597\]: Failed password for invalid user lijiang from 106.12.151.250 port 45732 ssh2Jul 8 13:48:23 vserver sshd\[32649\]: Invalid user cesareo from 106.12.151.250Jul 8 13:48:26 vserver sshd\[32649\]: Failed password for invalid user cesareo from 106.12.151.250 port 53230 ssh2 ... |
2020-07-08 20:37:16 |