City: unknown
Region: unknown
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.164.94.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43605
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;74.164.94.125. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 187 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 20:22:55 CST 2025
;; MSG SIZE rcvd: 106
125.94.164.74.in-addr.arpa domain name pointer adsl-074-164-094-125.sip.bct.bellsouth.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
125.94.164.74.in-addr.arpa name = adsl-074-164-094-125.sip.bct.bellsouth.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
45.94.7.250 | attackspam | Unauthorized connection attempt detected from IP address 45.94.7.250 to port 80 [J] |
2020-01-19 19:19:27 |
121.154.67.139 | attack | Unauthorized connection attempt detected from IP address 121.154.67.139 to port 23 [J] |
2020-01-19 19:34:17 |
128.199.233.65 | attackspambots | Unauthorized connection attempt detected from IP address 128.199.233.65 to port 2220 [J] |
2020-01-19 19:06:44 |
119.193.43.148 | attackspam | unauthorized connection attempt |
2020-01-19 19:08:24 |
14.170.212.23 | attackspambots | Unauthorized connection attempt detected from IP address 14.170.212.23 to port 4567 [J] |
2020-01-19 19:21:18 |
59.127.69.111 | attackspam | Unauthorized connection attempt detected from IP address 59.127.69.111 to port 4567 [J] |
2020-01-19 19:17:16 |
171.100.141.190 | attackbotsspam | Unauthorized connection attempt detected from IP address 171.100.141.190 to port 8080 [J] |
2020-01-19 19:05:02 |
116.103.37.21 | attackspam | Unauthorized connection attempt detected from IP address 116.103.37.21 to port 23 [J] |
2020-01-19 19:09:22 |
167.60.19.41 | attack | Unauthorized connection attempt detected from IP address 167.60.19.41 to port 85 [J] |
2020-01-19 19:29:57 |
123.194.52.39 | attack | Unauthorized connection attempt detected from IP address 123.194.52.39 to port 4567 [J] |
2020-01-19 19:07:11 |
123.207.40.81 | attackbots | Unauthorized connection attempt detected from IP address 123.207.40.81 to port 23 [J] |
2020-01-19 19:33:26 |
95.67.200.199 | attackbots | Unauthorized connection attempt detected from IP address 95.67.200.199 to port 23 [J] |
2020-01-19 19:12:45 |
95.67.114.52 | attack | Unauthorized connection attempt detected from IP address 95.67.114.52 to port 2220 [J] |
2020-01-19 19:12:57 |
88.148.116.227 | attackbotsspam | Unauthorized connection attempt detected from IP address 88.148.116.227 to port 8080 [J] |
2020-01-19 19:39:56 |
106.52.242.107 | attackbotsspam | Jan 19 15:48:37 gw1 sshd[14555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.242.107 Jan 19 15:48:39 gw1 sshd[14555]: Failed password for invalid user jts3 from 106.52.242.107 port 59084 ssh2 ... |
2020-01-19 19:10:52 |