City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.206.0.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7516
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;74.206.0.1. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 15:42:16 CST 2025
;; MSG SIZE rcvd: 103
1.0.206.74.in-addr.arpa domain name pointer 74-206-0-1.static-ip.m.telepacific.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
1.0.206.74.in-addr.arpa name = 74-206-0-1.static-ip.m.telepacific.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 220.94.12.47 | attackspambots | Port Scan |
2019-12-31 15:01:35 |
| 14.205.207.116 | attack | Port Scan |
2019-12-31 15:23:57 |
| 5.239.244.236 | attackspam | Dec 31 07:29:03 * sshd[27377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.239.244.236 Dec 31 07:29:05 * sshd[27377]: Failed password for invalid user operator from 5.239.244.236 port 43398 ssh2 |
2019-12-31 15:17:29 |
| 14.63.174.149 | attack | Dec 31 13:22:14 itv-usvr-02 sshd[17611]: Invalid user nfs from 14.63.174.149 port 49096 Dec 31 13:22:14 itv-usvr-02 sshd[17611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.174.149 Dec 31 13:22:14 itv-usvr-02 sshd[17611]: Invalid user nfs from 14.63.174.149 port 49096 Dec 31 13:22:16 itv-usvr-02 sshd[17611]: Failed password for invalid user nfs from 14.63.174.149 port 49096 ssh2 Dec 31 13:29:19 itv-usvr-02 sshd[18137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.174.149 user=root Dec 31 13:29:21 itv-usvr-02 sshd[18137]: Failed password for root from 14.63.174.149 port 46382 ssh2 |
2019-12-31 15:08:51 |
| 212.91.77.226 | attack | 2019-12-31T06:55:35.762481shield sshd\[2506\]: Invalid user backup from 212.91.77.226 port 40152 2019-12-31T06:55:35.767931shield sshd\[2506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.91.77.226 2019-12-31T06:55:37.668453shield sshd\[2506\]: Failed password for invalid user backup from 212.91.77.226 port 40152 ssh2 2019-12-31T06:58:00.158956shield sshd\[3132\]: Invalid user heald from 212.91.77.226 port 35894 2019-12-31T06:58:00.164338shield sshd\[3132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.91.77.226 |
2019-12-31 15:04:31 |
| 197.155.234.157 | attackbotsspam | Dec 31 06:28:43 marvibiene sshd[62257]: Invalid user squid from 197.155.234.157 port 41750 Dec 31 06:28:43 marvibiene sshd[62257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.155.234.157 Dec 31 06:28:43 marvibiene sshd[62257]: Invalid user squid from 197.155.234.157 port 41750 Dec 31 06:28:46 marvibiene sshd[62257]: Failed password for invalid user squid from 197.155.234.157 port 41750 ssh2 ... |
2019-12-31 15:26:58 |
| 85.15.48.137 | attackspam | 12/31/2019-01:29:37.627806 85.15.48.137 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2019-12-31 14:57:17 |
| 140.143.163.22 | attackbots | Dec 31 07:29:35 163-172-32-151 sshd[8515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.163.22 user=root Dec 31 07:29:36 163-172-32-151 sshd[8515]: Failed password for root from 140.143.163.22 port 42090 ssh2 ... |
2019-12-31 14:56:54 |
| 90.193.2.56 | attack | Port Scan |
2019-12-31 15:21:07 |
| 110.138.131.31 | attack | 1577773766 - 12/31/2019 07:29:26 Host: 110.138.131.31/110.138.131.31 Port: 445 TCP Blocked |
2019-12-31 15:03:21 |
| 216.218.206.91 | attackspambots | scan r |
2019-12-31 15:07:54 |
| 137.74.241.200 | attackbotsspam | Dec 31 05:57:28 mxgate1 postfix/postscreen[1966]: CONNECT from [137.74.241.200]:32913 to [176.31.12.44]:25 Dec 31 05:57:28 mxgate1 postfix/dnsblog[1970]: addr 137.74.241.200 listed by domain zen.spamhaus.org as 127.0.0.3 Dec 31 05:57:34 mxgate1 postfix/postscreen[1966]: DNSBL rank 2 for [137.74.241.200]:32913 Dec 31 05:57:34 mxgate1 postfix/tlsproxy[1972]: CONNECT from [137.74.241.200]:32913 Dec 31 05:57:43 mxgate1 postfix/postscreen[1966]: DISCONNECT [137.74.241.200]:32913 Dec 31 05:57:43 mxgate1 postfix/tlsproxy[1972]: DISCONNECT [137.74.241.200]:32913 Dec 31 05:58:13 mxgate1 postfix/postscreen[1966]: CONNECT from [137.74.241.200]:52171 to [176.31.12.44]:25 Dec 31 05:58:13 mxgate1 postfix/dnsblog[1971]: addr 137.74.241.200 listed by domain zen.spamhaus.org as 127.0.0.3 Dec 31 05:58:19 mxgate1 postfix/postscreen[1966]: DNSBL rank 2 for [137.74.241.200]:52171 Dec 31 05:58:19 mxgate1 postfix/tlsproxy[1972]: CONNECT from [137.74.241.200]:52171 Dec x@x Dec 31 05:58:28 mxga........ ------------------------------- |
2019-12-31 15:36:50 |
| 49.207.143.141 | attack | 1577773722 - 12/31/2019 07:28:42 Host: 49.207.143.141/49.207.143.141 Port: 445 TCP Blocked |
2019-12-31 15:28:51 |
| 67.205.144.236 | attack | Dec 31 08:01:24 [host] sshd[22764]: Invalid user klarika from 67.205.144.236 Dec 31 08:01:24 [host] sshd[22764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.144.236 Dec 31 08:01:27 [host] sshd[22764]: Failed password for invalid user klarika from 67.205.144.236 port 35638 ssh2 |
2019-12-31 15:02:23 |
| 123.27.203.196 | attackbotsspam | Port Scan |
2019-12-31 15:34:48 |