City: Farmington
Region: New Mexico
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.240.13.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.240.13.4. IN A
;; AUTHORITY SECTION:
. 544 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020031601 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 17 06:04:51 CST 2020
;; MSG SIZE rcvd: 115
4.13.240.50.in-addr.arpa domain name pointer 50-240-13-4-static.hfc.comcastbusiness.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
4.13.240.50.in-addr.arpa name = 50-240-13-4-static.hfc.comcastbusiness.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
60.30.98.194 | attack | Invalid user demo from 60.30.98.194 port 16274 |
2020-05-02 19:21:45 |
217.182.74.196 | attackbotsspam | May 2 11:35:15 markkoudstaal sshd[14516]: Failed password for root from 217.182.74.196 port 50254 ssh2 May 2 11:40:01 markkoudstaal sshd[15416]: Failed password for root from 217.182.74.196 port 34366 ssh2 May 2 11:44:44 markkoudstaal sshd[16330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.74.196 |
2020-05-02 19:20:52 |
14.63.166.243 | attackbots | Email SASL login failure |
2020-05-02 19:01:08 |
193.70.38.187 | attackspam | $f2bV_matches |
2020-05-02 19:04:46 |
170.0.22.138 | attackbotsspam | Telnet Server BruteForce Attack |
2020-05-02 18:59:23 |
46.101.19.133 | attack | Fail2Ban Ban Triggered (2) |
2020-05-02 18:56:01 |
174.218.144.168 | attackbotsspam | Chat Spam |
2020-05-02 19:24:38 |
162.243.144.104 | attack | Port scan(s) denied |
2020-05-02 19:14:47 |
74.72.240.163 | attackbotsspam | Hits on port : 5555 |
2020-05-02 18:53:34 |
185.175.93.27 | attack | 05/02/2020-05:01:16.244295 185.175.93.27 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-05-02 19:13:00 |
170.231.59.49 | attackbots | $f2bV_matches |
2020-05-02 19:26:13 |
62.28.217.62 | attackspam | May 2 12:06:18 MainVPS sshd[23276]: Invalid user test from 62.28.217.62 port 56766 May 2 12:06:18 MainVPS sshd[23276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.28.217.62 May 2 12:06:18 MainVPS sshd[23276]: Invalid user test from 62.28.217.62 port 56766 May 2 12:06:20 MainVPS sshd[23276]: Failed password for invalid user test from 62.28.217.62 port 56766 ssh2 May 2 12:09:57 MainVPS sshd[26703]: Invalid user ubuntu from 62.28.217.62 port 61445 ... |
2020-05-02 19:36:52 |
51.255.168.254 | attack | May 2 07:40:29 piServer sshd[5744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.254 May 2 07:40:31 piServer sshd[5744]: Failed password for invalid user aje from 51.255.168.254 port 50310 ssh2 May 2 07:44:39 piServer sshd[6001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.254 ... |
2020-05-02 19:32:14 |
155.0.252.80 | attackspam | Attempted connection to port 1433. |
2020-05-02 19:12:00 |
36.108.170.241 | attackbotsspam | May 2 06:32:45 mail sshd\[14084\]: Invalid user bala from 36.108.170.241 May 2 06:32:45 mail sshd\[14084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.108.170.241 ... |
2020-05-02 18:54:35 |