City: unknown
Region: unknown
Country: United States
Internet Service Provider: T-Mobile US
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.86.134.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48988
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;68.86.134.157. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025121703 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 18 11:22:24 CST 2025
;; MSG SIZE rcvd: 106
157.134.86.68.in-addr.arpa domain name pointer gi-103-0-0-30-ur21-d.westchester.pa.bo.comcast.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
157.134.86.68.in-addr.arpa name = gi-103-0-0-30-ur21-d.westchester.pa.bo.comcast.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 177.55.128.138 | attack | 2019-11-24T07:28:14.833505MailD postfix/smtpd[18403]: NOQUEUE: reject: RCPT from 138.128.55.177.static.evolunetcorp.com.br[177.55.128.138]: 554 5.7.1 Service unavailable; Client host [177.55.128.138] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?177.55.128.138; from= |
2019-11-24 15:44:15 |
| 104.211.215.159 | attack | Nov 23 21:42:03 kapalua sshd\[6415\]: Invalid user forghani from 104.211.215.159 Nov 23 21:42:03 kapalua sshd\[6415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.215.159 Nov 23 21:42:05 kapalua sshd\[6415\]: Failed password for invalid user forghani from 104.211.215.159 port 29722 ssh2 Nov 23 21:49:29 kapalua sshd\[6955\]: Invalid user buay from 104.211.215.159 Nov 23 21:49:29 kapalua sshd\[6955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.215.159 |
2019-11-24 16:00:25 |
| 85.214.195.220 | attack | Nov 24 09:28:01 hosting sshd[19384]: Invalid user yunIDC000!@#$% from 85.214.195.220 port 48356 ... |
2019-11-24 15:53:51 |
| 51.252.194.154 | attackbots | Nov 24 07:22:55 mxgate1 postfix/postscreen[13998]: CONNECT from [51.252.194.154]:1163 to [176.31.12.44]:25 Nov 24 07:22:55 mxgate1 postfix/dnsblog[14509]: addr 51.252.194.154 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 24 07:22:55 mxgate1 postfix/dnsblog[14511]: addr 51.252.194.154 listed by domain zen.spamhaus.org as 127.0.0.11 Nov 24 07:22:55 mxgate1 postfix/dnsblog[14511]: addr 51.252.194.154 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 24 07:22:55 mxgate1 postfix/dnsblog[14511]: addr 51.252.194.154 listed by domain zen.spamhaus.org as 127.0.0.3 Nov 24 07:22:55 mxgate1 postfix/dnsblog[14510]: addr 51.252.194.154 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Nov 24 07:22:55 mxgate1 postfix/dnsblog[14512]: addr 51.252.194.154 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 24 07:22:55 mxgate1 postfix/dnsblog[14508]: addr 51.252.194.154 listed by domain bl.spamcop.net as 127.0.0.2 Nov 24 07:23:01 mxgate1 postfix/postscreen[13998]: DNSBL rank 6 f........ ------------------------------- |
2019-11-24 15:36:42 |
| 188.247.65.179 | attack | Fail2Ban Ban Triggered |
2019-11-24 16:14:18 |
| 158.69.220.70 | attackbots | F2B jail: sshd. Time: 2019-11-24 08:32:24, Reported by: VKReport |
2019-11-24 15:45:39 |
| 213.142.148.151 | attackbots | SASL Brute Force |
2019-11-24 16:21:35 |
| 54.39.145.123 | attack | Nov 24 09:18:42 www4 sshd\[44170\]: Invalid user nginx from 54.39.145.123 Nov 24 09:18:42 www4 sshd\[44170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.145.123 Nov 24 09:18:44 www4 sshd\[44170\]: Failed password for invalid user nginx from 54.39.145.123 port 54480 ssh2 ... |
2019-11-24 16:17:54 |
| 51.77.147.95 | attackbots | Nov 24 09:00:16 SilenceServices sshd[7636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.147.95 Nov 24 09:00:18 SilenceServices sshd[7636]: Failed password for invalid user test from 51.77.147.95 port 42148 ssh2 Nov 24 09:03:27 SilenceServices sshd[8507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.147.95 |
2019-11-24 16:16:14 |
| 164.132.80.137 | attack | Nov 24 12:47:59 vibhu-HP-Z238-Microtower-Workstation sshd\[13585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137 user=news Nov 24 12:48:01 vibhu-HP-Z238-Microtower-Workstation sshd\[13585\]: Failed password for news from 164.132.80.137 port 52522 ssh2 Nov 24 12:54:19 vibhu-HP-Z238-Microtower-Workstation sshd\[13782\]: Invalid user francis from 164.132.80.137 Nov 24 12:54:19 vibhu-HP-Z238-Microtower-Workstation sshd\[13782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137 Nov 24 12:54:21 vibhu-HP-Z238-Microtower-Workstation sshd\[13782\]: Failed password for invalid user francis from 164.132.80.137 port 60544 ssh2 ... |
2019-11-24 15:40:19 |
| 27.69.242.187 | attack | Nov 24 07:59:20 alfc-lms-prod01 sshd\[11965\]: Invalid user system from 27.69.242.187 Nov 24 08:00:58 alfc-lms-prod01 sshd\[13631\]: Invalid user ubnt from 27.69.242.187 Nov 24 08:01:51 alfc-lms-prod01 sshd\[13978\]: Invalid user admin from 27.69.242.187 ... |
2019-11-24 16:05:34 |
| 132.145.18.157 | attackspambots | Nov 23 09:50:19 sshd[3729]: Invalid user ubuntu from 132.145.18.157 port 41288 |
2019-11-24 16:09:32 |
| 5.101.77.35 | attackbotsspam | Nov 21 07:36:35 em3 sshd[7907]: Invalid user elin from 5.101.77.35 Nov 21 07:36:35 em3 sshd[7907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.77.35 Nov 21 07:36:37 em3 sshd[7907]: Failed password for invalid user elin from 5.101.77.35 port 35814 ssh2 Nov 21 07:54:37 em3 sshd[8102]: Invalid user kobilan from 5.101.77.35 Nov 21 07:54:37 em3 sshd[8102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.101.77.35 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=5.101.77.35 |
2019-11-24 15:50:30 |
| 121.46.4.222 | attackbots | Nov 22 05:11:25 pl3server sshd[32127]: Invalid user www from 121.46.4.222 Nov 22 05:11:25 pl3server sshd[32127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.4.222 Nov 22 05:11:27 pl3server sshd[32127]: Failed password for invalid user www from 121.46.4.222 port 54163 ssh2 Nov 22 05:11:28 pl3server sshd[32127]: Received disconnect from 121.46.4.222: 11: Bye Bye [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=121.46.4.222 |
2019-11-24 15:58:48 |
| 182.73.47.154 | attackspambots | 2019-11-24T08:05:35.349268shield sshd\[22127\]: Invalid user shulkin from 182.73.47.154 port 45456 2019-11-24T08:05:35.355660shield sshd\[22127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.47.154 2019-11-24T08:05:36.879792shield sshd\[22127\]: Failed password for invalid user shulkin from 182.73.47.154 port 45456 ssh2 2019-11-24T08:12:44.334549shield sshd\[23867\]: Invalid user server from 182.73.47.154 port 51864 2019-11-24T08:12:44.341231shield sshd\[23867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.47.154 |
2019-11-24 16:14:52 |