City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.239.203.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;70.239.203.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 22:06:08 CST 2025
;; MSG SIZE rcvd: 107
142.203.239.70.in-addr.arpa domain name pointer 70-239-203-142.lightspeed.wchtks.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.203.239.70.in-addr.arpa name = 70-239-203-142.lightspeed.wchtks.sbcglobal.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 66.240.236.119 | attackbots | scans 2 times in preceeding hours on the ports (in chronological order) 1911 55443 |
2020-04-28 21:08:22 |
| 83.240.242.218 | attackbotsspam | 2020-04-28T14:06:30.389475ns386461 sshd\[525\]: Invalid user db2fenc2 from 83.240.242.218 port 43606 2020-04-28T14:06:30.393838ns386461 sshd\[525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.240.242.218 2020-04-28T14:06:32.577528ns386461 sshd\[525\]: Failed password for invalid user db2fenc2 from 83.240.242.218 port 43606 ssh2 2020-04-28T14:14:02.618005ns386461 sshd\[7492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.240.242.218 user=root 2020-04-28T14:14:04.850446ns386461 sshd\[7492\]: Failed password for root from 83.240.242.218 port 47178 ssh2 ... |
2020-04-28 21:51:44 |
| 222.186.175.151 | attack | Apr 28 19:45:10 webhost01 sshd[19080]: Failed password for root from 222.186.175.151 port 49534 ssh2 Apr 28 19:45:24 webhost01 sshd[19080]: error: maximum authentication attempts exceeded for root from 222.186.175.151 port 49534 ssh2 [preauth] ... |
2020-04-28 20:47:50 |
| 139.199.82.171 | attackbotsspam | Apr 28 15:19:02 legacy sshd[434]: Failed password for root from 139.199.82.171 port 34458 ssh2 Apr 28 15:23:02 legacy sshd[624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.82.171 Apr 28 15:23:05 legacy sshd[624]: Failed password for invalid user www from 139.199.82.171 port 49192 ssh2 ... |
2020-04-28 21:29:27 |
| 134.175.191.248 | attack | $f2bV_matches |
2020-04-28 21:50:56 |
| 188.151.72.137 | attackbotsspam | trying to access non-authorized port |
2020-04-28 21:47:46 |
| 171.103.150.158 | attackspam | proto=tcp . spt=35255 . dpt=993 . src=171.103.150.158 . dst=xx.xx.4.1 . Found on Blocklist de (268) |
2020-04-28 21:38:53 |
| 141.98.9.137 | attack | Apr 28 08:56:22 www sshd\[20750\]: Invalid user operator from 141.98.9.137 Apr 28 08:56:34 www sshd\[20789\]: Invalid user support from 141.98.9.137 ... |
2020-04-28 21:05:19 |
| 203.110.179.26 | attackbots | SSH brute force attempt |
2020-04-28 21:38:18 |
| 128.199.143.19 | attackspam | Apr 28 15:08:31 server sshd[22823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.143.19 Apr 28 15:08:34 server sshd[22823]: Failed password for invalid user jt from 128.199.143.19 port 54650 ssh2 Apr 28 15:13:51 server sshd[23667]: Failed password for root from 128.199.143.19 port 38620 ssh2 ... |
2020-04-28 21:18:35 |
| 114.84.181.220 | attackspam | Apr 28 15:15:19 ift sshd\[52038\]: Invalid user oozie from 114.84.181.220Apr 28 15:15:21 ift sshd\[52038\]: Failed password for invalid user oozie from 114.84.181.220 port 50891 ssh2Apr 28 15:18:09 ift sshd\[52531\]: Invalid user centos from 114.84.181.220Apr 28 15:18:11 ift sshd\[52531\]: Failed password for invalid user centos from 114.84.181.220 port 41840 ssh2Apr 28 15:21:09 ift sshd\[52970\]: Failed password for root from 114.84.181.220 port 32798 ssh2 ... |
2020-04-28 20:47:14 |
| 141.98.9.157 | attackspambots | Apr 28 08:56:14 www sshd\[20708\]: Invalid user admin from 141.98.9.157 Apr 28 08:56:25 www sshd\[20752\]: Invalid user test from 141.98.9.157 ... |
2020-04-28 21:29:03 |
| 141.98.9.160 | attack | Apr 28 08:56:17 www sshd\[20712\]: Invalid user user from 141.98.9.160 Apr 28 08:56:29 www sshd\[20765\]: Invalid user guest from 141.98.9.160 ... |
2020-04-28 21:22:12 |
| 139.99.125.191 | attackspam | 139.99.125.191 was recorded 6 times by 4 hosts attempting to connect to the following ports: 26014,50570,39019,51856. Incident counter (4h, 24h, all-time): 6, 31, 1174 |
2020-04-28 21:33:58 |
| 218.156.223.127 | attack | Honeypot attack, port: 81, PTR: PTR record not found |
2020-04-28 20:55:38 |