City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.64.172.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25712
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.64.172.134. IN A
;; AUTHORITY SECTION:
. 90 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010800 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 02:41:30 CST 2022
;; MSG SIZE rcvd: 106
134.172.64.64.in-addr.arpa domain name pointer ka-lte-kgn-ip1134.kos.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
134.172.64.64.in-addr.arpa name = ka-lte-kgn-ip1134.kos.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
125.215.207.40 | attack | Mar 4 21:28:30 gw1 sshd[18143]: Failed password for smmsp from 125.215.207.40 port 33186 ssh2 ... |
2020-03-05 02:12:48 |
62.30.222.78 | attackbotsspam | attempted connection to port 81 |
2020-03-05 02:36:48 |
220.130.10.13 | attackspambots | $f2bV_matches |
2020-03-05 02:12:24 |
74.82.47.50 | attack | attempted connection to port 23 |
2020-03-05 02:36:19 |
45.151.254.218 | attack | 03/04/2020-13:18:04.745624 45.151.254.218 Protocol: 17 ET SCAN Sipvicious User-Agent Detected (friendly-scanner) |
2020-03-05 02:21:58 |
84.22.42.115 | attackspam | port scan and connect, tcp 1433 (ms-sql-s) |
2020-03-05 02:25:57 |
50.227.195.3 | attackbotsspam | Mar 4 13:18:57 plusreed sshd[27266]: Invalid user ed from 50.227.195.3 ... |
2020-03-05 02:38:28 |
84.39.112.83 | attack | (From tara.dragon@datacomm.ch) Whаt's the most сonvеniеnt wау to gаin $83764 а mоnth: http://ijcavsgot.justinlist.org/8ad9bf8638 |
2020-03-05 02:00:25 |
92.63.194.90 | attackbots | (sshd) Failed SSH login from 92.63.194.90 (NL/Netherlands/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 4 19:15:01 ubnt-55d23 sshd[20972]: Invalid user 1234 from 92.63.194.90 port 58128 Mar 4 19:15:03 ubnt-55d23 sshd[20972]: Failed password for invalid user 1234 from 92.63.194.90 port 58128 ssh2 |
2020-03-05 02:17:10 |
220.120.106.254 | attack | $f2bV_matches |
2020-03-05 02:14:54 |
92.63.194.25 | attackspam | (sshd) Failed SSH login from 92.63.194.25 (NL/Netherlands/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 4 19:14:49 ubnt-55d23 sshd[20862]: Invalid user Administrator from 92.63.194.25 port 45507 Mar 4 19:14:50 ubnt-55d23 sshd[20862]: Failed password for invalid user Administrator from 92.63.194.25 port 45507 ssh2 |
2020-03-05 02:30:39 |
61.19.108.118 | attack | attempted connection to port 1433 |
2020-03-05 02:38:01 |
120.29.226.6 | attack | failed_logins |
2020-03-05 01:53:51 |
220.171.105.34 | attackspam | $f2bV_matches |
2020-03-05 01:53:18 |
219.250.188.133 | attack | $f2bV_matches |
2020-03-05 02:35:50 |