City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.142.99.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42739
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;74.142.99.2. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031300 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 16:12:57 CST 2025
;; MSG SIZE rcvd: 104
2.99.142.74.in-addr.arpa domain name pointer syn-074-142-099-002.biz.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
2.99.142.74.in-addr.arpa name = syn-074-142-099-002.biz.spectrum.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 1.32.250.74 | attackspam | 445/tcp 445/tcp [2019-09-18/22]2pkt |
2019-09-23 07:25:52 |
| 165.22.110.16 | attackspambots | Sep 23 00:51:03 MK-Soft-VM5 sshd[3452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.110.16 Sep 23 00:51:05 MK-Soft-VM5 sshd[3452]: Failed password for invalid user student from 165.22.110.16 port 56476 ssh2 ... |
2019-09-23 07:18:41 |
| 103.60.126.65 | attackspam | Sep 22 18:48:32 ny01 sshd[29751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.126.65 Sep 22 18:48:34 ny01 sshd[29751]: Failed password for invalid user administrador from 103.60.126.65 port 17312 ssh2 Sep 22 18:53:04 ny01 sshd[30577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.126.65 |
2019-09-23 06:57:47 |
| 85.106.122.48 | attackbots | Unauthorized connection attempt from IP address 85.106.122.48 on Port 445(SMB) |
2019-09-23 06:59:08 |
| 81.22.45.80 | attack | Sep 22 23:32:22 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.80 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=54848 PROTO=TCP SPT=59465 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-09-23 07:26:59 |
| 47.22.130.82 | attackspam | Sep 23 01:28:22 host sshd\[2292\]: Invalid user logout from 47.22.130.82 port 42630 Sep 23 01:28:24 host sshd\[2292\]: Failed password for invalid user logout from 47.22.130.82 port 42630 ssh2 ... |
2019-09-23 07:30:23 |
| 200.27.136.156 | attack | Unauthorized connection attempt from IP address 200.27.136.156 on Port 445(SMB) |
2019-09-23 07:09:18 |
| 157.37.208.29 | attack | Unauthorized connection attempt from IP address 157.37.208.29 on Port 445(SMB) |
2019-09-23 07:11:46 |
| 178.128.121.130 | attackspam | 2019-09-22T21:35:54.922999abusebot-2.cloudsearch.cf sshd\[1416\]: Invalid user jd from 178.128.121.130 port 40056 |
2019-09-23 07:26:17 |
| 101.26.139.52 | attack | Unauthorised access (Sep 23) SRC=101.26.139.52 LEN=40 TTL=49 ID=33917 TCP DPT=8080 WINDOW=44870 SYN Unauthorised access (Sep 22) SRC=101.26.139.52 LEN=40 TTL=49 ID=43953 TCP DPT=8080 WINDOW=35453 SYN |
2019-09-23 07:32:18 |
| 95.173.196.206 | attack | Sep 22 23:14:40 markkoudstaal sshd[9361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.173.196.206 Sep 22 23:14:42 markkoudstaal sshd[9361]: Failed password for invalid user email from 95.173.196.206 port 35934 ssh2 Sep 22 23:18:47 markkoudstaal sshd[9743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.173.196.206 |
2019-09-23 07:22:37 |
| 210.245.2.226 | attackbots | Sep 22 12:54:06 lcdev sshd\[28873\]: Invalid user user from 210.245.2.226 Sep 22 12:54:06 lcdev sshd\[28873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.2.226 Sep 22 12:54:08 lcdev sshd\[28873\]: Failed password for invalid user user from 210.245.2.226 port 48756 ssh2 Sep 22 12:58:54 lcdev sshd\[29329\]: Invalid user upload from 210.245.2.226 Sep 22 12:58:54 lcdev sshd\[29329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.245.2.226 |
2019-09-23 07:02:17 |
| 138.121.32.178 | attack | Unauthorized connection attempt from IP address 138.121.32.178 on Port 445(SMB) |
2019-09-23 07:30:05 |
| 31.210.65.150 | attackspambots | 2019-09-22T23:14:15.159995abusebot-7.cloudsearch.cf sshd\[25959\]: Invalid user teamspeak from 31.210.65.150 port 36075 |
2019-09-23 07:20:07 |
| 94.176.5.253 | attack | (Sep 23) LEN=44 TTL=244 ID=5671 DF TCP DPT=23 WINDOW=14600 SYN (Sep 23) LEN=44 TTL=244 ID=44899 DF TCP DPT=23 WINDOW=14600 SYN (Sep 22) LEN=44 TTL=244 ID=16598 DF TCP DPT=23 WINDOW=14600 SYN (Sep 22) LEN=44 TTL=244 ID=43177 DF TCP DPT=23 WINDOW=14600 SYN (Sep 22) LEN=44 TTL=244 ID=46862 DF TCP DPT=23 WINDOW=14600 SYN (Sep 22) LEN=44 TTL=244 ID=24898 DF TCP DPT=23 WINDOW=14600 SYN (Sep 22) LEN=44 TTL=244 ID=8561 DF TCP DPT=23 WINDOW=14600 SYN (Sep 22) LEN=44 TTL=244 ID=33801 DF TCP DPT=23 WINDOW=14600 SYN (Sep 22) LEN=44 TTL=244 ID=7334 DF TCP DPT=23 WINDOW=14600 SYN (Sep 22) LEN=44 TTL=244 ID=44216 DF TCP DPT=23 WINDOW=14600 SYN (Sep 22) LEN=44 TTL=244 ID=3274 DF TCP DPT=23 WINDOW=14600 SYN (Sep 22) LEN=44 TTL=244 ID=10011 DF TCP DPT=23 WINDOW=14600 SYN (Sep 22) LEN=44 TTL=244 ID=21819 DF TCP DPT=23 WINDOW=14600 SYN (Sep 22) LEN=44 TTL=244 ID=58901 DF TCP DPT=23 WINDOW=14600 SYN (Sep 22) LEN=44 TTL=244 ID=39171 DF TCP DPT=23 WINDOW=14600 SYN ... |
2019-09-23 07:21:00 |