City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.91.11.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11131
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;71.91.11.94. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020201 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 13:28:01 CST 2025
;; MSG SIZE rcvd: 104
94.11.91.71.in-addr.arpa domain name pointer syn-071-091-011-094.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
94.11.91.71.in-addr.arpa name = syn-071-091-011-094.res.spectrum.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 208.90.161.245 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2019-06-29 17:24:33 |
| 36.33.132.204 | attackbots | Jun 29 10:41:30 OPSO sshd\[9038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.33.132.204 user=root Jun 29 10:41:33 OPSO sshd\[9038\]: Failed password for root from 36.33.132.204 port 44465 ssh2 Jun 29 10:41:35 OPSO sshd\[9038\]: Failed password for root from 36.33.132.204 port 44465 ssh2 Jun 29 10:41:38 OPSO sshd\[9038\]: Failed password for root from 36.33.132.204 port 44465 ssh2 Jun 29 10:41:39 OPSO sshd\[9038\]: Failed password for root from 36.33.132.204 port 44465 ssh2 |
2019-06-29 17:03:09 |
| 219.157.186.207 | attackspambots | 23/tcp [2019-06-29]1pkt |
2019-06-29 17:38:37 |
| 85.144.226.170 | attack | Jun 29 11:01:13 mail sshd\[5290\]: Invalid user admin from 85.144.226.170 port 44978 Jun 29 11:01:13 mail sshd\[5290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.144.226.170 Jun 29 11:01:15 mail sshd\[5290\]: Failed password for invalid user admin from 85.144.226.170 port 44978 ssh2 Jun 29 11:02:52 mail sshd\[5406\]: Invalid user oracles from 85.144.226.170 port 33404 Jun 29 11:02:52 mail sshd\[5406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.144.226.170 |
2019-06-29 17:17:10 |
| 71.6.143.94 | attackbots | 29.06.2019 08:41:27 Recursive DNS scan |
2019-06-29 17:20:11 |
| 111.252.140.18 | attack | 445/tcp [2019-06-29]1pkt |
2019-06-29 17:47:09 |
| 117.34.73.110 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found |
2019-06-29 17:38:02 |
| 83.137.223.171 | attackspambots | [portscan] Port scan |
2019-06-29 17:11:29 |
| 119.116.64.220 | attackspambots | Honeypot attack, port: 23, PTR: PTR record not found |
2019-06-29 16:56:17 |
| 112.133.236.71 | attackbotsspam | 445/tcp [2019-06-29]1pkt |
2019-06-29 17:41:02 |
| 222.186.19.221 | attack | Honeypot attack, application: ssdp, PTR: PTR record not found |
2019-06-29 16:54:09 |
| 145.249.104.198 | attackspambots | Jun 29 08:01:49 XXX sshd[11038]: Invalid user admin from 145.249.104.198 port 33888 |
2019-06-29 17:00:49 |
| 81.192.159.130 | attackspambots | Automated report - ssh fail2ban: Jun 29 10:38:53 authentication failure Jun 29 10:38:55 wrong password, user=psybnc, port=34712, ssh2 Jun 29 10:55:36 authentication failure |
2019-06-29 17:05:30 |
| 183.184.193.144 | attack | 23/tcp [2019-06-29]1pkt |
2019-06-29 17:18:48 |
| 91.246.64.101 | attack | Honeypot attack, port: 23, PTR: ip-91.246.64.101.skyware.pl. |
2019-06-29 17:19:34 |