City: Fair Oaks
Region: California
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 63.198.13.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30889
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;63.198.13.163. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:32:16 CST 2025
;; MSG SIZE rcvd: 106
163.13.198.63.in-addr.arpa domain name pointer adsl-63-198-13-163.davis95616.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
163.13.198.63.in-addr.arpa name = adsl-63-198-13-163.davis95616.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
117.33.158.93 | attackspam | $f2bV_matches |
2020-04-30 00:55:08 |
154.160.69.170 | attackbotsspam | $f2bV_matches |
2020-04-30 01:29:10 |
218.76.73.75 | attack | Invalid user courier from 218.76.73.75 port 36206 |
2020-04-30 01:16:26 |
200.107.13.18 | attackbots | Invalid user zk from 200.107.13.18 port 59206 |
2020-04-30 01:19:42 |
212.170.50.203 | attackbotsspam | Invalid user admin from 212.170.50.203 port 40592 |
2020-04-30 01:17:12 |
128.199.142.138 | attack | $f2bV_matches |
2020-04-30 00:52:06 |
77.64.242.232 | attackspam | Failed password for root from 77.64.242.232 port 38392 ssh2 |
2020-04-30 01:03:44 |
182.61.5.148 | attack | 2020-04-28 00:27:14 server sshd[69239]: Failed password for invalid user teamspeak from 182.61.5.148 port 41096 ssh2 |
2020-04-30 01:24:47 |
182.254.153.90 | attackspam | Invalid user tryton |
2020-04-30 00:43:55 |
153.170.62.9 | attack | LOG |
2020-04-30 00:48:09 |
139.59.18.197 | attack | Apr 29 19:04:12 icinga sshd[2726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.197 Apr 29 19:04:13 icinga sshd[2726]: Failed password for invalid user taiga from 139.59.18.197 port 35214 ssh2 Apr 29 19:13:20 icinga sshd[18471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.18.197 ... |
2020-04-30 01:30:16 |
148.70.68.175 | attack | Failed password for root from 148.70.68.175 port 58312 ssh2 |
2020-04-30 01:29:29 |
185.123.164.52 | attackbotsspam | Apr 29 15:59:31 163-172-32-151 sshd[18398]: Invalid user yyn from 185.123.164.52 port 53256 ... |
2020-04-30 01:23:33 |
78.252.28.25 | attackspam | Invalid user anca from 78.252.28.25 port 34720 |
2020-04-30 01:03:20 |
103.46.139.230 | attack | Invalid user cherry from 103.46.139.230 port 38942 |
2020-04-30 01:01:04 |