City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.138.233.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60419
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.138.233.209.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 02:58:15 CST 2025
;; MSG SIZE  rcvd: 107209.233.138.50.in-addr.arpa domain name pointer c-50-138-233-209.hsd1.ct.comcast.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
209.233.138.50.in-addr.arpa	name = c-50-138-233-209.hsd1.ct.comcast.net.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 222.186.180.147 | attackbots | Nov 23 13:56:54 odroid64 sshd\[6276\]: User root from 222.186.180.147 not allowed because not listed in AllowUsers Nov 23 13:56:54 odroid64 sshd\[6276\]: Failed none for invalid user root from 222.186.180.147 port 3418 ssh2 ... | 2019-11-23 20:57:17 | 
| 103.75.101.23 | attackbots | port scan and connect, tcp 22 (ssh) | 2019-11-23 20:42:39 | 
| 89.248.168.217 | attackbotsspam | Fail2Ban Ban Triggered | 2019-11-23 20:56:40 | 
| 94.178.207.14 | attackspam | Unauthorised access (Nov 23) SRC=94.178.207.14 LEN=48 TTL=121 ID=26871 DF TCP DPT=445 WINDOW=65535 SYN Unauthorised access (Nov 18) SRC=94.178.207.14 LEN=48 TTL=121 ID=11729 DF TCP DPT=1433 WINDOW=65535 SYN Unauthorised access (Nov 17) SRC=94.178.207.14 LEN=48 TTL=121 ID=31190 DF TCP DPT=445 WINDOW=65535 SYN | 2019-11-23 20:36:58 | 
| 163.172.84.50 | attack | Nov 23 07:20:17 lnxded63 sshd[8806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.84.50 | 2019-11-23 20:51:31 | 
| 191.249.60.89 | attackspam | Automatic report - Port Scan Attack | 2019-11-23 21:11:41 | 
| 128.134.30.40 | attackspambots | Nov 23 06:20:37 venus sshd\[26494\]: Invalid user fillup from 128.134.30.40 port 39738 Nov 23 06:20:37 venus sshd\[26494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.134.30.40 Nov 23 06:20:39 venus sshd\[26494\]: Failed password for invalid user fillup from 128.134.30.40 port 39738 ssh2 ... | 2019-11-23 20:40:25 | 
| 185.175.93.25 | attackbots | 11/23/2019-10:07:43.886167 185.175.93.25 Protocol: 6 ET DROP Dshield Block Listed Source group 1 | 2019-11-23 20:40:05 | 
| 188.168.25.165 | attackspambots | spam FO | 2019-11-23 20:48:35 | 
| 185.222.211.18 | attackbotsspam | ET SCAN MS Terminal Server Traffic on Non-standard Port - port: 80 proto: TCP cat: Attempted Information Leak | 2019-11-23 20:49:11 | 
| 45.141.86.131 | attackspam | Fail2Ban Ban Triggered | 2019-11-23 20:53:46 | 
| 85.159.66.239 | attackbots | 11/23/2019-07:20:40.346008 85.159.66.239 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 | 2019-11-23 20:40:45 | 
| 115.144.219.110 | attack | firewall-block, port(s): 5555/tcp | 2019-11-23 20:47:00 | 
| 45.55.182.232 | attack | Repeated brute force against a port | 2019-11-23 20:47:33 | 
| 184.105.139.106 | attackbots | 3389/tcp 9200/tcp 123/udp... [2019-09-23/11-23]34pkt,11pt.(tcp),2pt.(udp) | 2019-11-23 20:43:23 |