City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.207.96.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57691
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;69.207.96.239. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400
;; Query time: 155 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 13:26:27 CST 2025
;; MSG SIZE rcvd: 106
239.96.207.69.in-addr.arpa domain name pointer syn-069-207-096-239.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
239.96.207.69.in-addr.arpa name = syn-069-207-096-239.res.spectrum.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 79.239.197.3 | attack | 2019-09-20T09:15:24.426814abusebot-8.cloudsearch.cf sshd\[22230\]: Invalid user anwendersoftware from 79.239.197.3 port 49079 |
2019-09-20 18:49:58 |
| 68.14.209.234 | attack | Port Scan: UDP/137 |
2019-09-20 19:17:38 |
| 194.223.7.159 | attackbots | Port Scan: TCP/139 |
2019-09-20 19:30:14 |
| 60.12.168.222 | attack | Port Scan: UDP/49153 |
2019-09-20 19:19:50 |
| 216.14.163.172 | attack | Sep 20 00:22:52 wbs sshd\[6692\]: Invalid user pass from 216.14.163.172 Sep 20 00:22:52 wbs sshd\[6692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.14.163.172 Sep 20 00:22:54 wbs sshd\[6692\]: Failed password for invalid user pass from 216.14.163.172 port 11008 ssh2 Sep 20 00:29:40 wbs sshd\[7342\]: Invalid user exploit from 216.14.163.172 Sep 20 00:29:40 wbs sshd\[7342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.14.163.172 |
2019-09-20 18:43:24 |
| 34.90.40.212 | attackspam | Port Scan: TCP/443 |
2019-09-20 19:22:08 |
| 208.84.91.42 | attack | Port Scan: TCP/135 |
2019-09-20 19:03:14 |
| 196.52.43.57 | attackspambots | 5000/tcp 20249/tcp 3389/tcp... [2019-07-20/09-20]96pkt,55pt.(tcp),6pt.(udp) |
2019-09-20 19:29:14 |
| 216.67.94.74 | attack | Port Scan: UDP/137 |
2019-09-20 19:24:55 |
| 206.189.217.163 | attack | 09/20/2019-06:49:39.167777 206.189.217.163 Protocol: 6 ET SCAN Potential SSH Scan |
2019-09-20 18:51:06 |
| 189.138.76.44 | attackbots | Port Scan: UDP/137 |
2019-09-20 19:31:47 |
| 183.129.219.226 | attackbotsspam | Port Scan: UDP/49153 |
2019-09-20 19:33:41 |
| 139.59.80.189 | attackspam | WordPress login Brute force / Web App Attack on client site. |
2019-09-20 18:58:01 |
| 12.190.200.59 | attackbots | Port Scan: UDP/137 |
2019-09-20 19:23:23 |
| 70.182.10.24 | attackspambots | Port Scan: UDP/32789 |
2019-09-20 19:16:46 |