City: Indianapolis
Region: Indiana
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.253.60.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39128
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;68.253.60.142.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 11:59:57 CST 2025
;; MSG SIZE  rcvd: 106Host 142.60.253.68.in-addr.arpa not found: 2(SERVFAIL)
server can't find 68.253.60.142.in-addr.arpa: SERVFAIL| IP | Type | Details | Datetime | 
|---|---|---|---|
| 112.104.98.52 | attackbotsspam | Unauthorized connection attempt from IP address 112.104.98.52 on Port 445(SMB) | 2020-01-30 03:07:54 | 
| 182.243.40.157 | attackbots | 23/tcp [2020-01-29]1pkt | 2020-01-30 03:22:31 | 
| 1.172.199.87 | attack | 1580304720 - 01/29/2020 14:32:00 Host: 1.172.199.87/1.172.199.87 Port: 445 TCP Blocked | 2020-01-30 03:23:15 | 
| 118.68.89.242 | attackbotsspam | 445/tcp [2020-01-29]1pkt | 2020-01-30 03:31:45 | 
| 185.220.101.21 | attackspam | 01/29/2020-18:38:19.768154 185.220.101.21 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 30 | 2020-01-30 03:15:46 | 
| 156.210.145.189 | attack | 52869/tcp [2020-01-29]1pkt | 2020-01-30 03:25:04 | 
| 46.201.247.209 | attackbots | Unauthorized connection attempt from IP address 46.201.247.209 on Port 445(SMB) | 2020-01-30 02:59:37 | 
| 113.203.233.65 | attackspambots | Unauthorized connection attempt from IP address 113.203.233.65 on Port 445(SMB) | 2020-01-30 03:05:09 | 
| 58.87.111.2 | attackbotsspam | Jan 29 20:14:58 meumeu sshd[23777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.111.2 Jan 29 20:15:00 meumeu sshd[23777]: Failed password for invalid user tanmeet from 58.87.111.2 port 42746 ssh2 Jan 29 20:18:02 meumeu sshd[24254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.111.2 Jan 29 20:18:04 meumeu sshd[24254]: Failed password for invalid user sukhdev from 58.87.111.2 port 38542 ssh2 ... | 2020-01-30 03:36:59 | 
| 197.49.162.54 | attackbots | 2019-04-09 14:16:49 H=\(host-197.49.162.54.tedata.net\) \[197.49.162.54\]:22471 I=\[193.107.88.166\]:25 F=\ | 2020-01-30 03:32:52 | 
| 138.97.66.57 | attack | Disconnected \(auth failed, 1 attempts in 12 secs\): | 2020-01-30 03:14:18 | 
| 218.92.0.212 | attackbotsspam | Jan 29 20:24:33 SilenceServices sshd[6431]: Failed password for root from 218.92.0.212 port 9772 ssh2 Jan 29 20:24:46 SilenceServices sshd[6431]: error: maximum authentication attempts exceeded for root from 218.92.0.212 port 9772 ssh2 [preauth] Jan 29 20:24:52 SilenceServices sshd[7017]: Failed password for root from 218.92.0.212 port 41124 ssh2 | 2020-01-30 03:34:00 | 
| 197.99.72.249 | attack | 2019-03-08 12:31:56 1h2DjH-0008Je-HV SMTP connection from 197-99-72-249.ip.broadband.is \(197-99-72-249.lte.broadband.is\) \[197.99.72.249\]:25614 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-08 12:32:58 1h2DkI-0008LZ-2c SMTP connection from 197-99-72-249.ip.broadband.is \(197-99-72-249.lte.broadband.is\) \[197.99.72.249\]:26028 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-08 12:33:25 1h2Dki-0008M6-Kb SMTP connection from 197-99-72-249.ip.broadband.is \(197-99-72-249.lte.broadband.is\) \[197.99.72.249\]:26275 I=\[193.107.88.166\]:25 closed by DROP in ACL ... | 2020-01-30 03:17:26 | 
| 107.189.11.193 | attack | Unauthorized connection attempt detected from IP address 107.189.11.193 to port 22 [J] | 2020-01-30 03:35:45 | 
| 49.150.82.70 | attackspambots | 445/tcp [2020-01-29]1pkt | 2020-01-30 03:29:55 |