City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.128.55.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65195
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;72.128.55.84.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 02:12:04 CST 2025
;; MSG SIZE  rcvd: 105
        84.55.128.72.in-addr.arpa domain name pointer syn-072-128-055-084.res.spectrum.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
84.55.128.72.in-addr.arpa	name = syn-072-128-055-084.res.spectrum.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 46.105.250.204 | attackbots | Port scan attempt detected by AWS-CCS, CTS, India  | 
                    2019-07-29 22:20:08 | 
| 89.248.162.168 | attackspambots | Portscan or hack attempt detected by psad/fwsnort  | 
                    2019-07-29 22:12:02 | 
| 134.209.100.247 | attackspambots | Jul 29 14:13:46 [munged] sshd[26799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.100.247 user=root Jul 29 14:13:47 [munged] sshd[26799]: Failed password for root from 134.209.100.247 port 59342 ssh2  | 
                    2019-07-29 21:34:16 | 
| 179.191.81.194 | attackspam | Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445  | 
                    2019-07-29 22:28:48 | 
| 91.200.104.46 | attackbotsspam | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services  | 
                    2019-07-29 22:11:08 | 
| 92.53.65.196 | attackbotsspam | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services  | 
                    2019-07-29 22:06:53 | 
| 189.230.93.43 | attackspam | Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445  | 
                    2019-07-29 22:25:28 | 
| 216.218.206.108 | attackspam | RDP Scan  | 
                    2019-07-29 21:28:58 | 
| 194.28.115.244 | attack | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services  | 
                    2019-07-29 21:38:25 | 
| 120.52.152.16 | attackbots | 29.07.2019 13:33:15 Connection to port 7071 blocked by firewall  | 
                    2019-07-29 22:03:02 | 
| 194.28.112.140 | attackbots | Port scan: Attack repeated for 24 hours  | 
                    2019-07-29 21:39:44 | 
| 180.126.237.128 | attack | Honeypot hit.  | 
                    2019-07-29 22:27:25 | 
| 217.11.74.114 | attackbots | Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445  | 
                    2019-07-29 22:23:11 | 
| 125.64.94.212 | attackspam | Port scan attempt detected by AWS-CCS, CTS, India  | 
                    2019-07-29 21:59:41 | 
| 185.209.0.17 | attack | Multiport scan : 9 ports scanned 7866 7867 7870 7874 7884 7891 7892 7903 7904  | 
                    2019-07-29 21:44:52 |