City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.161.85.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;68.161.85.70. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 14:51:11 CST 2025
;; MSG SIZE rcvd: 105
70.85.161.68.in-addr.arpa domain name pointer pool-68-161-85-70.ny325.east.verizon.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
70.85.161.68.in-addr.arpa name = pool-68-161-85-70.ny325.east.verizon.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.12.85.172 | attackspam | SSH Brute-Force on port 22 |
2019-07-25 03:35:18 |
| 195.154.199.185 | attackspam | CloudCIX Reconnaissance Scan Detected, PTR: 195-154-199-185.rev.poneytelecom.eu. |
2019-07-25 03:14:36 |
| 107.170.200.25 | attackbotsspam | 58712/tcp 4786/tcp 636/tcp... [2019-05-23/07-24]75pkt,61pt.(tcp),5pt.(udp) |
2019-07-25 03:54:02 |
| 159.65.75.4 | attack | Jul 24 18:36:52 *** sshd[12923]: Invalid user icinga from 159.65.75.4 |
2019-07-25 03:23:21 |
| 216.236.177.108 | attack | 445/tcp 445/tcp 445/tcp... [2019-05-30/07-24]9pkt,1pt.(tcp) |
2019-07-25 03:23:00 |
| 112.85.42.237 | attack | Jul 25 00:57:27 vibhu-HP-Z238-Microtower-Workstation sshd\[20077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237 user=root Jul 25 00:57:29 vibhu-HP-Z238-Microtower-Workstation sshd\[20077\]: Failed password for root from 112.85.42.237 port 48541 ssh2 Jul 25 00:58:14 vibhu-HP-Z238-Microtower-Workstation sshd\[20088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237 user=root Jul 25 00:58:16 vibhu-HP-Z238-Microtower-Workstation sshd\[20088\]: Failed password for root from 112.85.42.237 port 38075 ssh2 Jul 25 01:00:26 vibhu-HP-Z238-Microtower-Workstation sshd\[20160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237 user=root ... |
2019-07-25 03:49:54 |
| 186.154.255.77 | attackspambots | Unauthorised access (Jul 24) SRC=186.154.255.77 LEN=40 TTL=241 ID=23628 TCP DPT=445 WINDOW=1024 SYN |
2019-07-25 03:32:25 |
| 114.38.10.71 | attack | " " |
2019-07-25 03:24:05 |
| 172.105.192.195 | attackspam | firewall-block, port(s): 9089/tcp |
2019-07-25 03:25:02 |
| 68.183.216.217 | attack | CloudCIX Reconnaissance Scan Detected, PTR: crossfitampthill.com. |
2019-07-25 03:33:44 |
| 142.93.69.148 | attackspam | SSH User Authentication Brute Force Attempt, PTR: PTR record not found |
2019-07-25 03:50:53 |
| 37.228.117.32 | attack | These are people / users who try to send programs for data capture (spy), see examples below, there are no limits: From root@nn15.varejovips.com Wed Jul 24 03:13:41 2019 Received: from nn15.varejovips.com ([37.228.117.32]:39654) (envelope-from |
2019-07-25 03:12:13 |
| 185.173.177.132 | attackbots | More spam, using a strange font to get around junk email rules. |
2019-07-25 03:31:43 |
| 198.55.103.47 | attackbotsspam | CloudCIX Reconnaissance Scan Detected, PTR: 198.55.103.47.static.quadranet.com. |
2019-07-25 03:44:18 |
| 172.68.74.40 | attackspambots | 8443/tcp 8080/tcp... [2019-05-25/07-24]24pkt,2pt.(tcp) |
2019-07-25 03:55:12 |