City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: Level 3 Parent, LLC
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.158.0.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27218
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;64.158.0.134. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019051800 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 18 20:46:07 CST 2019
;; MSG SIZE rcvd: 116
134.0.158.64.in-addr.arpa domain name pointer unknown.Level3.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
134.0.158.64.in-addr.arpa name = unknown.Level3.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
46.101.97.5 | attackbotsspam | SSH Invalid Login |
2020-05-03 06:21:00 |
58.217.103.57 | attackbotsspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-05-03 06:18:10 |
51.91.68.39 | attackbotsspam | firewall-block, port(s): 23843/tcp |
2020-05-03 06:18:43 |
162.243.137.176 | attackspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-05-03 06:02:49 |
60.22.74.221 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-05-03 06:17:56 |
185.53.88.102 | attackspambots | ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-05-03 05:59:55 |
88.214.26.53 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 4785 proto: TCP cat: Misc Attack |
2020-05-03 06:10:36 |
64.227.9.196 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 52 - port: 1892 proto: TCP cat: Misc Attack |
2020-05-03 06:14:55 |
85.172.98.94 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 73 - port: 8089 proto: TCP cat: Misc Attack |
2020-05-03 06:12:17 |
104.194.11.42 | attackbots | [MK-VM3] Blocked by UFW |
2020-05-03 06:06:24 |
45.113.70.223 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 22 - port: 3774 proto: TCP cat: Misc Attack |
2020-05-03 06:22:41 |
31.14.136.214 | attackspam | Invalid user tsuser from 31.14.136.214 port 33134 |
2020-05-03 06:26:06 |
46.101.149.23 | attack | Invalid user admin from 46.101.149.23 port 58038 |
2020-05-03 06:20:37 |
185.143.223.244 | attack | ET DROP Dshield Block Listed Source group 1 - port: 3387 proto: TCP cat: Misc Attack |
2020-05-03 05:59:28 |
37.59.100.22 | attackspambots | 2020-05-02T21:47:15.705849shield sshd\[16842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=22.ip-37-59-100.eu user=root 2020-05-02T21:47:18.372608shield sshd\[16842\]: Failed password for root from 37.59.100.22 port 48450 ssh2 2020-05-02T21:50:57.478205shield sshd\[17331\]: Invalid user niraj from 37.59.100.22 port 53217 2020-05-02T21:50:57.481814shield sshd\[17331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=22.ip-37-59-100.eu 2020-05-02T21:50:59.956641shield sshd\[17331\]: Failed password for invalid user niraj from 37.59.100.22 port 53217 ssh2 |
2020-05-03 05:56:06 |