City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: CenturyLink Communications, LLC
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.239.48.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24360
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;67.239.48.64. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019082400 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 25 00:15:02 CST 2019
;; MSG SIZE rcvd: 116
64.48.239.67.in-addr.arpa domain name pointer pa-67-239-48-64.dhcp.embarqhsd.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
64.48.239.67.in-addr.arpa name = pa-67-239-48-64.dhcp.embarqhsd.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 134.209.70.2 | attack | SSH login attempts with user root. |
2019-11-30 06:31:48 |
| 143.255.241.105 | attackbotsspam | 8080/tcp 8080/tcp [2019-10-20/11-29]2pkt |
2019-11-30 06:51:13 |
| 176.31.131.255 | attackbots | 11/29/2019-17:43:55.106002 176.31.131.255 Protocol: 17 ET SCAN Sipvicious Scan |
2019-11-30 07:03:07 |
| 114.118.96.2 | attackbotsspam | SSH login attempts with user root. |
2019-11-30 06:42:17 |
| 103.27.238.2 | attack | SSH login attempts with user root. |
2019-11-30 07:05:14 |
| 81.169.246.201 | attack | WordpressAttack |
2019-11-30 07:00:06 |
| 108.162.210.154 | attackspambots | 8443/tcp 8443/tcp 8443/tcp... [2019-10-12/11-29]6pkt,1pt.(tcp) |
2019-11-30 06:39:21 |
| 114.112.58.1 | attackspambots | SSH login attempts with user root. |
2019-11-30 06:42:46 |
| 103.66.16.1 | attackspambots | SSH login attempts with user root. |
2019-11-30 07:02:22 |
| 122.51.49.9 | attackspam | SSH login attempts with user root. |
2019-11-30 06:37:23 |
| 61.151.247.189 | attack | firewall-block, port(s): 445/tcp |
2019-11-30 06:47:40 |
| 103.99.176.1 | attack | web Attack on Website |
2019-11-30 07:01:03 |
| 106.52.106.6 | attackspambots | SSH login attempts with user root. |
2019-11-30 06:48:22 |
| 106.13.147.6 | attack | SSH login attempts with user root. |
2019-11-30 06:52:47 |
| 106.12.24.1 | attack | SSH brute-force: detected 6 distinct usernames within a 24-hour window. |
2019-11-30 06:54:03 |