City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.85.102.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55668
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.85.102.240. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 00:52:42 CST 2025
;; MSG SIZE rcvd: 106
240.102.85.66.in-addr.arpa domain name pointer 66-85-102-240.static-ip.telepacific.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
240.102.85.66.in-addr.arpa name = 66-85-102-240.static-ip.telepacific.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
145.102.6.55 | attack | Port scan on 1 port(s): 53 |
2019-06-27 22:04:40 |
201.69.239.97 | attackspam | 8080/tcp [2019-06-27]1pkt |
2019-06-27 22:23:27 |
101.89.150.214 | attackbots | Jun 27 20:08:35 itv-usvr-02 sshd[20435]: Invalid user dbuser from 101.89.150.214 port 33325 Jun 27 20:08:35 itv-usvr-02 sshd[20435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.150.214 Jun 27 20:08:35 itv-usvr-02 sshd[20435]: Invalid user dbuser from 101.89.150.214 port 33325 Jun 27 20:08:38 itv-usvr-02 sshd[20435]: Failed password for invalid user dbuser from 101.89.150.214 port 33325 ssh2 Jun 27 20:10:43 itv-usvr-02 sshd[20525]: Invalid user apache from 101.89.150.214 port 39457 |
2019-06-27 21:57:07 |
128.14.209.236 | attackbots | " " |
2019-06-27 22:31:18 |
181.48.116.50 | attackbots | Jun 27 15:10:54 ArkNodeAT sshd\[24459\]: Invalid user md from 181.48.116.50 Jun 27 15:10:54 ArkNodeAT sshd\[24459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.116.50 Jun 27 15:10:56 ArkNodeAT sshd\[24459\]: Failed password for invalid user md from 181.48.116.50 port 49908 ssh2 |
2019-06-27 21:47:48 |
179.110.114.212 | attack | 8080/tcp [2019-06-27]1pkt |
2019-06-27 22:32:35 |
217.13.48.202 | attackbotsspam | 7071/tcp [2019-06-27]1pkt |
2019-06-27 22:34:15 |
78.100.189.88 | attack | Lines containing failures of 78.100.189.88 Jun 25 14:05:01 server-name sshd[6275]: Invalid user testuser from 78.100.189.88 port 39636 Jun 25 14:05:01 server-name sshd[6275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.100.189.88 Jun 25 14:05:04 server-name sshd[6275]: Failed password for invalid user testuser from 78.100.189.88 port 39636 ssh2 Jun 25 14:05:04 server-name sshd[6275]: Received disconnect from 78.100.189.88 port 39636:11: Bye Bye [preauth] Jun 25 14:05:04 server-name sshd[6275]: Disconnected from invalid user testuser 78.100.189.88 port 39636 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=78.100.189.88 |
2019-06-27 22:42:30 |
218.57.72.138 | attackbots | 23/tcp [2019-06-27]1pkt |
2019-06-27 21:49:19 |
37.72.175.114 | attackspambots | 20 attempts against mh_ha-misbehave-ban on light.magehost.pro |
2019-06-27 22:26:02 |
94.90.3.153 | attack | 23/tcp [2019-06-27]1pkt |
2019-06-27 21:54:24 |
218.61.17.2 | attack | Port scan attempt detected by AWS-CCS, CTS, India |
2019-06-27 22:16:11 |
46.101.43.224 | attack | Jun 27 15:44:26 lnxded64 sshd[18944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.43.224 Jun 27 15:44:26 lnxded64 sshd[18944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.43.224 |
2019-06-27 21:58:57 |
111.246.157.119 | attackspambots | 37215/tcp [2019-06-27]1pkt |
2019-06-27 21:47:20 |
103.218.253.88 | attackspambots | 445/tcp [2019-06-27]1pkt |
2019-06-27 22:32:02 |