City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 75.214.78.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46212
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;75.214.78.248. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 07:48:28 CST 2025
;; MSG SIZE rcvd: 106
248.78.214.75.in-addr.arpa domain name pointer 248.sub-75-214-78.myvzw.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
248.78.214.75.in-addr.arpa name = 248.sub-75-214-78.myvzw.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 216.170.122.47 | attackbots | 20/2/19@09:13:24: FAIL: Alarm-Network address from=216.170.122.47 ... |
2020-02-20 00:40:57 |
| 177.91.79.21 | attack | Feb 19 15:38:20 server sshd[1149229]: Failed password for invalid user yuchen from 177.91.79.21 port 41054 ssh2 Feb 19 15:41:33 server sshd[1151286]: Failed password for invalid user amandabackup from 177.91.79.21 port 34776 ssh2 Feb 19 15:44:50 server sshd[1153237]: Failed password for invalid user ftpuser from 177.91.79.21 port 56734 ssh2 |
2020-02-20 00:25:31 |
| 103.76.23.245 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-20 00:44:37 |
| 63.80.88.191 | attackbotsspam | Feb 19 14:35:57 grey postfix/smtpd\[20585\]: NOQUEUE: reject: RCPT from recipient.nabhaa.com\[63.80.88.191\]: 554 5.7.1 Service unavailable\; Client host \[63.80.88.191\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.80.88.191\]\; from=\ |
2020-02-20 00:37:52 |
| 141.98.80.173 | attack | Feb 19 16:50:21 marvibiene sshd[3796]: Invalid user dietpi from 141.98.80.173 port 16261 Feb 19 16:50:21 marvibiene sshd[3796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.80.173 Feb 19 16:50:21 marvibiene sshd[3796]: Invalid user dietpi from 141.98.80.173 port 16261 Feb 19 16:50:23 marvibiene sshd[3796]: Failed password for invalid user dietpi from 141.98.80.173 port 16261 ssh2 ... |
2020-02-20 00:52:03 |
| 115.231.219.231 | attack | 3389/tcp [2020-02-19]1pkt |
2020-02-20 00:19:02 |
| 190.201.113.141 | attackspam | 445/tcp [2020-02-19]1pkt |
2020-02-20 00:30:29 |
| 103.9.227.174 | attackbotsspam | 1433/tcp 445/tcp... [2019-12-21/2020-02-19]8pkt,2pt.(tcp) |
2020-02-20 00:37:31 |
| 115.75.91.201 | attack | 445/tcp [2020-02-19]1pkt |
2020-02-20 00:23:18 |
| 221.213.48.51 | attackspam | 6379/tcp [2020-02-19]1pkt |
2020-02-20 00:28:02 |
| 113.221.92.193 | attackbots | 1433/tcp [2020-02-19]1pkt |
2020-02-20 00:08:10 |
| 103.74.111.63 | attack | 445/tcp [2020-02-19]1pkt |
2020-02-20 00:26:15 |
| 218.240.137.68 | attack | Feb 19 14:51:31 legacy sshd[25140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.240.137.68 Feb 19 14:51:33 legacy sshd[25140]: Failed password for invalid user oracle from 218.240.137.68 port 24884 ssh2 Feb 19 14:55:09 legacy sshd[25176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.240.137.68 ... |
2020-02-20 00:40:15 |
| 104.140.188.22 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-20 00:16:33 |
| 114.35.84.21 | attackbots | port scan and connect, tcp 23 (telnet) |
2020-02-20 00:50:26 |