City: Baldwin Park
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: MegaPath Corporation
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.244.96.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54015
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;72.244.96.45. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019072001 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 21 02:20:36 CST 2019
;; MSG SIZE rcvd: 116
45.96.244.72.in-addr.arpa domain name pointer h-72-244-96-45.lsan.ca.megapath.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
45.96.244.72.in-addr.arpa name = h-72-244-96-45.lsan.ca.megapath.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 190.94.144.42 | attackspam | Unauthorized connection attempt detected from IP address 190.94.144.42 to port 8080 [J] |
2020-01-22 21:52:38 |
| 68.174.76.210 | attackbots | Unauthorized connection attempt detected from IP address 68.174.76.210 to port 81 [J] |
2020-01-22 22:10:14 |
| 2.233.67.171 | attack | Unauthorized connection attempt detected from IP address 2.233.67.171 to port 23 [J] |
2020-01-22 22:15:49 |
| 120.50.8.46 | attackbots | Unauthorized connection attempt detected from IP address 120.50.8.46 to port 2220 [J] |
2020-01-22 22:02:47 |
| 46.200.16.196 | attackbotsspam | Unauthorized connection attempt detected from IP address 46.200.16.196 to port 23 [J] |
2020-01-22 22:11:50 |
| 59.8.221.41 | attackspam | Unauthorized connection attempt detected from IP address 59.8.221.41 to port 4567 [J] |
2020-01-22 21:42:52 |
| 27.56.133.53 | attack | Unauthorized connection attempt detected from IP address 27.56.133.53 to port 8000 [J] |
2020-01-22 21:45:28 |
| 36.189.222.254 | attackbotsspam | Automatic report - SSH Brute-Force Attack |
2020-01-22 22:15:06 |
| 85.173.245.221 | attackspam | Unauthorized connection attempt detected from IP address 85.173.245.221 to port 8081 [J] |
2020-01-22 21:38:39 |
| 210.61.233.128 | attackspambots | Unauthorized connection attempt detected from IP address 210.61.233.128 to port 23 [J] |
2020-01-22 21:50:55 |
| 216.93.140.92 | attackspambots | Unauthorized connection attempt detected from IP address 216.93.140.92 to port 4567 [J] |
2020-01-22 21:48:48 |
| 154.125.11.123 | attackbots | Unauthorized connection attempt detected from IP address 154.125.11.123 to port 23 [J] |
2020-01-22 21:59:05 |
| 2.55.95.12 | attackspam | Unauthorized connection attempt detected from IP address 2.55.95.12 to port 4567 [J] |
2020-01-22 22:16:24 |
| 5.42.76.231 | attackbots | Unauthorized connection attempt detected from IP address 5.42.76.231 to port 23 [J] |
2020-01-22 21:47:01 |
| 187.0.221.222 | attackspam | Unauthorized connection attempt detected from IP address 187.0.221.222 to port 2220 [J] |
2020-01-22 21:54:27 |