City: Jersey City
Region: New Jersey
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.141.44.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;69.141.44.16. IN A
;; AUTHORITY SECTION:
. 462 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019122701 1800 900 604800 86400
;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 28 03:53:20 CST 2019
;; MSG SIZE rcvd: 116
16.44.141.69.in-addr.arpa domain name pointer c-69-141-44-16.hsd1.nj.comcast.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
16.44.141.69.in-addr.arpa name = c-69-141-44-16.hsd1.nj.comcast.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 183.129.141.44 | attackspam | SSH brute-force: detected 6 distinct usernames within a 24-hour window. |
2020-04-14 18:26:50 |
| 167.172.207.15 | attack | 167.172.207.15 was recorded 6 times by 6 hosts attempting to connect to the following ports: 53. Incident counter (4h, 24h, all-time): 6, 7, 7 |
2020-04-14 18:31:38 |
| 103.221.252.46 | attack | Invalid user postgres from 103.221.252.46 port 36174 |
2020-04-14 18:08:44 |
| 49.235.93.192 | attack | IP blocked |
2020-04-14 18:19:09 |
| 206.189.128.215 | attack | Port 4400 scan denied |
2020-04-14 18:25:32 |
| 209.17.96.66 | attack | Automatic report - Banned IP Access |
2020-04-14 18:24:12 |
| 222.90.70.69 | attackspambots | 2020-04-13 UTC: (48x) - UBNT,aD-min.123,aaa,admin,geometry,kky,mailer,monteiro,nagios,odoo,olivier,oracle(2x),php,root(27x),sales,tanja,terminal,testing,user,vicky,zabbix |
2020-04-14 18:03:56 |
| 51.77.193.20 | attackbots | (ftpd) Failed FTP login from 51.77.193.20 (FR/France/20.ip-51-77-193.eu): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 14 09:36:05 ir1 pure-ftpd: (?@51.77.193.20) [WARNING] Authentication failed for user [%user%] |
2020-04-14 18:00:25 |
| 183.134.91.53 | attack | Bruteforce detected by fail2ban |
2020-04-14 18:29:34 |
| 176.32.34.173 | attackspam | Port 11211 (memcache) access denied |
2020-04-14 18:37:02 |
| 119.96.172.174 | attackspam | Apr 14 07:15:01 our-server-hostname postfix/smtpd[20944]: connect from unknown[119.96.172.174] Apr x@x Apr 14 07:15:03 our-server-hostname postfix/smtpd[20944]: disconnect from unknown[119.96.172.174] Apr 14 12:18:44 our-server-hostname postfix/smtpd[14495]: connect from unknown[119.96.172.174] Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=119.96.172.174 |
2020-04-14 18:27:30 |
| 2.57.204.107 | attackbotsspam | Port 23 (Telnet) access denied |
2020-04-14 18:08:00 |
| 95.55.37.53 | attack | 95.55.37.53 |
2020-04-14 18:35:48 |
| 93.174.95.106 | attackbots | SIP/5060 Probe, BF, Hack - |
2020-04-14 18:30:37 |
| 190.9.130.159 | attackbots | SSH Login Bruteforce |
2020-04-14 18:32:52 |