City: Bryan
Region: Texas
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.64.80.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51500
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.64.80.75. IN A
;; AUTHORITY SECTION:
. 237 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023050601 1800 900 604800 86400
;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 07 10:09:34 CST 2023
;; MSG SIZE rcvd: 104
75.80.64.66.in-addr.arpa domain name pointer archi.tamu.edu.
75.80.64.66.in-addr.arpa domain name pointer ccrd.tamu.edu.
75.80.64.66.in-addr.arpa domain name pointer cchd.tamu.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
75.80.64.66.in-addr.arpa name = archi.tamu.edu.
75.80.64.66.in-addr.arpa name = ccrd.tamu.edu.
75.80.64.66.in-addr.arpa name = cchd.tamu.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
223.27.234.253 | attackspambots | Aug 6 08:01:22 vps200512 sshd\[16404\]: Invalid user userftp from 223.27.234.253 Aug 6 08:01:22 vps200512 sshd\[16404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.27.234.253 Aug 6 08:01:24 vps200512 sshd\[16404\]: Failed password for invalid user userftp from 223.27.234.253 port 40636 ssh2 Aug 6 08:06:20 vps200512 sshd\[16455\]: Invalid user plaza from 223.27.234.253 Aug 6 08:06:20 vps200512 sshd\[16455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.27.234.253 |
2019-08-06 20:07:17 |
41.208.68.28 | attackspambots | RDPBruteGSL |
2019-08-06 19:26:43 |
190.52.128.8 | attackbotsspam | Aug 6 03:20:52 lnxmail61 sshd[16107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.52.128.8 |
2019-08-06 19:28:12 |
121.33.247.107 | attackspam | Brute force attempt |
2019-08-06 19:46:28 |
180.126.239.48 | attackbots | Telnetd brute force attack detected by fail2ban |
2019-08-06 19:35:22 |
193.37.213.86 | attack | Aug 5 21:21:03 localhost kernel: [16298656.749737] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=193.37.213.86 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=26155 PROTO=TCP SPT=53895 DPT=8443 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 5 21:21:03 localhost kernel: [16298656.749763] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=193.37.213.86 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=26155 PROTO=TCP SPT=53895 DPT=8443 SEQ=3783141038 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 |
2019-08-06 19:21:56 |
153.36.242.143 | attackbots | Reported by AbuseIPDB proxy server. |
2019-08-06 19:58:46 |
90.206.98.74 | attackspam | Automatic report - Port Scan Attack |
2019-08-06 20:23:23 |
85.209.0.11 | attackspam | Port scan on 9 port(s): 18230 23266 25860 26966 28173 28732 32358 42221 53901 |
2019-08-06 20:17:53 |
82.127.22.145 | attackbots | Automatic report - Port Scan Attack |
2019-08-06 19:57:48 |
180.126.236.48 | attackbotsspam | Automatic report - Port Scan Attack |
2019-08-06 20:14:15 |
121.96.253.58 | attackspambots | Automatic report - Port Scan Attack |
2019-08-06 19:47:59 |
112.2.25.39 | attackspambots | 3389BruteforceFW21 |
2019-08-06 19:57:02 |
113.176.107.23 | attackspam | Automatic report - Port Scan Attack |
2019-08-06 19:53:04 |
182.123.201.254 | attack | firewall-block, port(s): 23/tcp |
2019-08-06 19:23:14 |