City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 96.42.68.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;96.42.68.217.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 03:12:59 CST 2025
;; MSG SIZE  rcvd: 105217.68.42.96.in-addr.arpa domain name pointer syn-096-042-068-217.res.spectrum.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
217.68.42.96.in-addr.arpa	name = syn-096-042-068-217.res.spectrum.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 94.15.172.181 | attack | DATE:2019-08-12 06:17:53, IP:94.15.172.181, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc-bis) | 2019-08-12 16:44:21 | 
| 104.236.22.133 | attack | Aug 12 09:08:21 MK-Soft-Root1 sshd\[5898\]: Invalid user galaxiv from 104.236.22.133 port 44736 Aug 12 09:08:21 MK-Soft-Root1 sshd\[5898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.22.133 Aug 12 09:08:23 MK-Soft-Root1 sshd\[5898\]: Failed password for invalid user galaxiv from 104.236.22.133 port 44736 ssh2 ... | 2019-08-12 16:48:16 | 
| 112.85.42.94 | attack | Aug 12 04:02:58 ny01 sshd[8277]: Failed password for root from 112.85.42.94 port 35141 ssh2 Aug 12 04:03:00 ny01 sshd[8277]: Failed password for root from 112.85.42.94 port 35141 ssh2 Aug 12 04:03:02 ny01 sshd[8277]: Failed password for root from 112.85.42.94 port 35141 ssh2 | 2019-08-12 16:26:52 | 
| 185.36.81.169 | attackbotsspam | Brute force attack | 2019-08-12 16:32:05 | 
| 40.68.1.240 | attack | Automatic report - Banned IP Access | 2019-08-12 16:49:14 | 
| 121.66.154.171 | attackspam | Autoban 121.66.154.171 AUTH/CONNECT | 2019-08-12 16:37:38 | 
| 90.114.115.72 | attackspambots | Honeypot attack, port: 5555, PTR: PTR record not found | 2019-08-12 16:48:47 | 
| 77.87.77.19 | attackspam | 08/11/2019-22:34:37.949360 77.87.77.19 Protocol: 6 ET SCAN NMAP -sS window 1024 | 2019-08-12 16:35:55 | 
| 73.169.179.92 | attackbotsspam | Honeypot attack, port: 23, PTR: c-73-169-179-92.hsd1.wa.comcast.net. | 2019-08-12 16:46:43 | 
| 104.248.56.37 | attackbots | Aug 12 09:31:09 dev0-dcde-rnet sshd[10192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.56.37 Aug 12 09:31:11 dev0-dcde-rnet sshd[10192]: Failed password for invalid user chase from 104.248.56.37 port 33688 ssh2 Aug 12 09:35:07 dev0-dcde-rnet sshd[10625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.56.37 | 2019-08-12 16:24:20 | 
| 207.154.193.178 | attackbotsspam | Invalid user ms from 207.154.193.178 port 53882 | 2019-08-12 16:30:53 | 
| 157.230.144.158 | attack | Aug 12 06:41:25 mail sshd\[26108\]: Invalid user sgeadmin from 157.230.144.158 Aug 12 06:41:25 mail sshd\[26108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.144.158 Aug 12 06:41:26 mail sshd\[26108\]: Failed password for invalid user sgeadmin from 157.230.144.158 port 58372 ssh2 ... | 2019-08-12 16:19:16 | 
| 134.209.63.140 | attack | Aug 12 10:16:48 plex sshd[32720]: Invalid user jrun from 134.209.63.140 port 45580 | 2019-08-12 16:20:51 | 
| 175.149.49.198 | attack | Honeypot attack, port: 23, PTR: PTR record not found | 2019-08-12 16:41:39 | 
| 80.211.187.250 | attack | Aug 12 04:10:18 plusreed sshd[1594]: Invalid user nc from 80.211.187.250 ... | 2019-08-12 16:21:30 |