City: Calgary
Region: Alberta
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: Shaw Communications Inc.
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.66.152.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33391
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.66.152.216. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019052100 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 22 00:30:26 CST 2019
;; MSG SIZE rcvd: 117
216.152.66.50.in-addr.arpa domain name pointer S010624ab81b78800.cg.shawcable.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
216.152.66.50.in-addr.arpa name = S010624ab81b78800.cg.shawcable.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
123.21.15.82 | attackspambots | SSH Brute-Force Attack |
2020-05-06 19:29:48 |
123.207.85.150 | attack | SSH Brute-Force Attack |
2020-05-06 19:28:42 |
123.206.202.14 | attackbots | SSH Brute-Force Attack |
2020-05-06 19:52:53 |
172.245.229.93 | attackbotsspam | (From eric@talkwithwebvisitor.com) Hi, my name is Eric and I’m betting you’d like your website bretowchiropractic.com to generate more leads. Here’s how: Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number. It signals you as soon as they say they’re interested – so that you can talk to that lead while they’re still there at bretowchiropractic.com. Talk With Web Visitor – CLICK HERE http://www.talkwithwebvisitor.com for a live demo now. And now that you’ve got their phone number, our new SMS Text With Lead feature enables you to start a text (SMS) conversation – answer questions, provide more info, and close a deal that way. If they don’t take you up on your offer then, just follow up with text messages for new offers, content links, even just “how you doing?” notes to build a relationship. CLICK HERE http://www.talkwithwebvisitor.com to discover what Talk With Web Visitor can do for your business. The dif |
2020-05-06 19:25:18 |
123.207.149.93 | attack | (sshd) Failed SSH login from 123.207.149.93 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 6 10:43:31 amsweb01 sshd[28291]: Invalid user peter from 123.207.149.93 port 54438 May 6 10:43:33 amsweb01 sshd[28291]: Failed password for invalid user peter from 123.207.149.93 port 54438 ssh2 May 6 10:54:45 amsweb01 sshd[29711]: Invalid user pc from 123.207.149.93 port 60388 May 6 10:54:47 amsweb01 sshd[29711]: Failed password for invalid user pc from 123.207.149.93 port 60388 ssh2 May 6 11:02:25 amsweb01 sshd[30526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.149.93 user=root |
2020-05-06 19:38:21 |
1.172.6.250 | attack | Unauthorized connection attempt from IP address 1.172.6.250 on Port 445(SMB) |
2020-05-06 19:54:13 |
123.21.217.110 | attackbotsspam | SSH Brute-Force Attack |
2020-05-06 19:26:49 |
123.206.176.219 | attackspam | SSH Brute-Force Attack |
2020-05-06 19:55:20 |
123.207.188.95 | attackbotsspam | May 6 14:17:55 itv-usvr-02 sshd[1722]: Invalid user deb from 123.207.188.95 port 36544 May 6 14:17:55 itv-usvr-02 sshd[1722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.188.95 May 6 14:17:55 itv-usvr-02 sshd[1722]: Invalid user deb from 123.207.188.95 port 36544 May 6 14:17:57 itv-usvr-02 sshd[1722]: Failed password for invalid user deb from 123.207.188.95 port 36544 ssh2 May 6 14:19:43 itv-usvr-02 sshd[1803]: Invalid user long from 123.207.188.95 port 46824 |
2020-05-06 19:35:29 |
123.20.44.201 | attack | SSH Brute-Force Attack |
2020-05-06 19:59:13 |
123.206.90.149 | attack | SSH Brute-Force Attack |
2020-05-06 19:42:50 |
123.206.62.112 | attackbotsspam | May 6 11:12:32 ns382633 sshd\[16828\]: Invalid user ssss from 123.206.62.112 port 50498 May 6 11:12:32 ns382633 sshd\[16828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.62.112 May 6 11:12:34 ns382633 sshd\[16828\]: Failed password for invalid user ssss from 123.206.62.112 port 50498 ssh2 May 6 11:29:23 ns382633 sshd\[19998\]: Invalid user harvey from 123.206.62.112 port 55268 May 6 11:29:23 ns382633 sshd\[19998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.62.112 |
2020-05-06 19:47:19 |
162.243.141.50 | attackbotsspam | Port probing on unauthorized port 20547 |
2020-05-06 19:32:45 |
123.206.69.81 | attackspambots | SSH Brute-Force Attack |
2020-05-06 19:44:54 |
123.207.157.108 | attack | SSH Brute-Force Attack |
2020-05-06 19:37:29 |