City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.42.200.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57286
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;71.42.200.84. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 04:31:51 CST 2025
;; MSG SIZE rcvd: 105
84.200.42.71.in-addr.arpa domain name pointer syn-071-042-200-084.biz.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
84.200.42.71.in-addr.arpa name = syn-071-042-200-084.biz.spectrum.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 14.116.199.99 | attackspam | Mar 28 13:48:28 dev0-dcde-rnet sshd[1426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.199.99 Mar 28 13:48:30 dev0-dcde-rnet sshd[1426]: Failed password for invalid user wmp from 14.116.199.99 port 50172 ssh2 Mar 28 14:05:30 dev0-dcde-rnet sshd[1634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.116.199.99 |
2020-03-29 03:01:11 |
| 222.130.130.113 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-03-29 03:02:09 |
| 84.38.184.53 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 73 - port: 1210 proto: TCP cat: Misc Attack |
2020-03-29 02:53:54 |
| 45.134.179.243 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 26 - port: 9538 proto: TCP cat: Misc Attack |
2020-03-29 03:31:40 |
| 192.241.238.193 | attack | port scan and connect, tcp 443 (https) |
2020-03-29 03:04:33 |
| 82.221.105.6 | attackbots | 03/28/2020-15:07:12.246562 82.221.105.6 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 85 |
2020-03-29 03:21:15 |
| 186.210.142.145 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-03-29 03:05:22 |
| 185.156.73.38 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 645 proto: TCP cat: Misc Attack |
2020-03-29 03:08:12 |
| 185.176.27.42 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 1341 proto: TCP cat: Misc Attack |
2020-03-29 03:06:13 |
| 45.141.84.29 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 27 - port: 4000 proto: TCP cat: Misc Attack |
2020-03-29 03:31:23 |
| 87.251.74.14 | attack | 03/28/2020-15:08:37.448536 87.251.74.14 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-29 03:18:43 |
| 86.101.56.141 | attack | (sshd) Failed SSH login from 86.101.56.141 (HU/Hungary/catv-86-101-56-141.catv.broadband.hu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 28 13:11:57 localhost sshd[24731]: Invalid user hqk from 86.101.56.141 port 51380 Mar 28 13:11:59 localhost sshd[24731]: Failed password for invalid user hqk from 86.101.56.141 port 51380 ssh2 Mar 28 13:33:27 localhost sshd[26085]: Did not receive identification string from 86.101.56.141 port 45880 Mar 28 13:58:52 localhost sshd[27963]: Invalid user kwn from 86.101.56.141 port 34560 Mar 28 13:58:54 localhost sshd[27963]: Failed password for invalid user kwn from 86.101.56.141 port 34560 ssh2 |
2020-03-29 02:53:22 |
| 89.248.168.220 | attack | Fail2Ban Ban Triggered |
2020-03-29 02:52:00 |
| 162.243.132.148 | attackspambots | ET SCAN Suspicious inbound to mySQL port 3306 - port: 3306 proto: TCP cat: Potentially Bad Traffic |
2020-03-29 03:10:31 |
| 65.229.5.158 | attackspambots | SSH Brute Force |
2020-03-29 02:56:33 |