City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.247.106.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39777
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.247.106.124. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 20:26:18 CST 2025
;; MSG SIZE rcvd: 107
124.106.247.50.in-addr.arpa domain name pointer 50-247-106-124-static.hfc.comcastbusiness.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
124.106.247.50.in-addr.arpa name = 50-247-106-124-static.hfc.comcastbusiness.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 94.50.239.218 | attack | 2019-09-16 16:20:40 1i9rrr-0001nI-1q SMTP connection from \(\[94.50.239.218\]\) \[94.50.239.218\]:21923 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-16 16:20:56 1i9rs7-0001nf-G3 SMTP connection from \(\[94.50.239.218\]\) \[94.50.239.218\]:22123 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-16 16:21:05 1i9rsG-0001ny-PK SMTP connection from \(\[94.50.239.218\]\) \[94.50.239.218\]:22226 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2019-10-24 20:55:16 |
| 192.99.152.101 | attack | Oct 24 08:42:57 mail sshd\[31667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.152.101 user=root ... |
2019-10-24 21:11:42 |
| 218.150.220.214 | attackspam | Invalid user administrator from 218.150.220.214 port 33634 |
2019-10-24 21:04:16 |
| 223.4.70.106 | attackbotsspam | Invalid user ftpuser from 223.4.70.106 port 53742 |
2019-10-24 21:08:08 |
| 145.239.116.170 | attackspambots | Invalid user train from 145.239.116.170 port 34898 |
2019-10-24 21:21:20 |
| 54.36.182.244 | attackspambots | 2019-10-24T13:18:27.367421shield sshd\[5369\]: Invalid user 123456 from 54.36.182.244 port 44322 2019-10-24T13:18:27.371333shield sshd\[5369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244.ip-54-36-182.eu 2019-10-24T13:18:29.634496shield sshd\[5369\]: Failed password for invalid user 123456 from 54.36.182.244 port 44322 ssh2 2019-10-24T13:22:01.874027shield sshd\[5948\]: Invalid user tracy123 from 54.36.182.244 port 43787 2019-10-24T13:22:01.879183shield sshd\[5948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244.ip-54-36-182.eu |
2019-10-24 21:33:26 |
| 159.89.155.148 | attack | Invalid user liuliu from 159.89.155.148 port 35956 |
2019-10-24 21:18:35 |
| 145.249.105.204 | attack | SSH brutforce |
2019-10-24 21:20:53 |
| 129.204.90.220 | attackspam | Invalid user ftpadmin2 from 129.204.90.220 port 36704 |
2019-10-24 21:06:49 |
| 191.7.152.13 | attack | Automatic report - Banned IP Access |
2019-10-24 21:12:06 |
| 134.175.13.36 | attackspambots | Invalid user ai from 134.175.13.36 port 34822 |
2019-10-24 21:22:10 |
| 203.195.243.146 | attack | Invalid user builduser from 203.195.243.146 port 41446 |
2019-10-24 21:39:32 |
| 118.34.12.35 | attack | Invalid user admin from 118.34.12.35 port 44218 |
2019-10-24 21:25:28 |
| 121.227.152.235 | attack | Invalid user kodeit from 121.227.152.235 port 10788 |
2019-10-24 21:24:25 |
| 203.66.168.81 | attackbots | Invalid user post1 from 203.66.168.81 port 55094 |
2019-10-24 21:09:25 |