City: Oroville
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 76.149.55.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1637
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;76.149.55.22. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062900 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 29 17:45:48 CST 2025
;; MSG SIZE rcvd: 105
Host 22.55.149.76.in-addr.arpa not found: 2(SERVFAIL)
server can't find 76.149.55.22.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 148.70.249.72 | attackbots | $f2bV_matches |
2019-07-10 15:57:09 |
| 89.43.67.45 | attack | 445/tcp 445/tcp 445/tcp... [2019-05-16/07-09]12pkt,1pt.(tcp) |
2019-07-10 16:36:05 |
| 52.170.7.159 | attackspambots | Jul 10 01:15:49 mail sshd[1464]: Invalid user cip from 52.170.7.159 Jul 10 01:15:49 mail sshd[1464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.170.7.159 Jul 10 01:15:49 mail sshd[1464]: Invalid user cip from 52.170.7.159 Jul 10 01:15:51 mail sshd[1464]: Failed password for invalid user cip from 52.170.7.159 port 52658 ssh2 ... |
2019-07-10 16:03:18 |
| 46.219.3.139 | attackbotsspam | 2019-07-09 UTC: 2x - |
2019-07-10 16:26:32 |
| 159.65.150.212 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2019-07-10 16:24:03 |
| 1.173.162.98 | attack | 37215/tcp 37215/tcp 37215/tcp [2019-07-07/09]3pkt |
2019-07-10 16:15:43 |
| 134.209.127.226 | attackspam | 19/7/9@19:14:46: FAIL: Alarm-Intrusion address from=134.209.127.226 ... |
2019-07-10 16:33:04 |
| 73.2.73.84 | attack | Brute forcing Wordpress login |
2019-07-10 16:33:25 |
| 114.232.0.242 | attackspam | Distributed brute force attack |
2019-07-10 16:20:04 |
| 106.12.193.160 | attackspam | Jul 9 23:40:05 localhost sshd\[65451\]: Invalid user myftp from 106.12.193.160 port 55284 Jul 9 23:40:05 localhost sshd\[65451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.160 Jul 9 23:40:07 localhost sshd\[65451\]: Failed password for invalid user myftp from 106.12.193.160 port 55284 ssh2 Jul 9 23:43:10 localhost sshd\[65597\]: Invalid user r from 106.12.193.160 port 54044 Jul 9 23:43:10 localhost sshd\[65597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.160 ... |
2019-07-10 16:13:40 |
| 196.52.43.115 | attack | firewall-block, port(s): 5984/tcp |
2019-07-10 16:22:23 |
| 92.118.161.61 | attackspam | [IPBX probe: SIP=tcp/5060] *(RWIN=1024)(07101052) |
2019-07-10 16:23:39 |
| 167.99.156.157 | attackspambots | Automatic report - Web App Attack |
2019-07-10 16:04:48 |
| 202.120.38.28 | attackbotsspam | Jul 10 05:42:17 MK-Soft-Root2 sshd\[24631\]: Invalid user admin from 202.120.38.28 port 15361 Jul 10 05:42:17 MK-Soft-Root2 sshd\[24631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.120.38.28 Jul 10 05:42:18 MK-Soft-Root2 sshd\[24631\]: Failed password for invalid user admin from 202.120.38.28 port 15361 ssh2 ... |
2019-07-10 16:01:57 |
| 46.161.27.42 | attackspam | 10.07.2019 07:38:20 Connection to port 1723 blocked by firewall |
2019-07-10 16:12:37 |