City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 98.149.202.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;98.149.202.70. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022701 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 02:56:33 CST 2025
;; MSG SIZE rcvd: 106
70.202.149.98.in-addr.arpa domain name pointer syn-098-149-202-070.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
70.202.149.98.in-addr.arpa name = syn-098-149-202-070.res.spectrum.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 54.36.182.244 | attack | Invalid user sa from 54.36.182.244 port 47897 |
2020-02-19 08:29:49 |
| 103.99.38.24 | attackbotsspam | Unauthorized connection attempt from IP address 103.99.38.24 on Port 445(SMB) |
2020-02-19 08:16:14 |
| 106.124.142.64 | attackbots | Invalid user testtest from 106.124.142.64 port 44136 |
2020-02-19 08:33:36 |
| 190.217.201.113 | attackspam | Unauthorized connection attempt from IP address 190.217.201.113 on Port 445(SMB) |
2020-02-19 08:15:20 |
| 115.97.17.171 | attack | Automatic report - Port Scan Attack |
2020-02-19 08:38:40 |
| 123.103.242.188 | attackspambots | port scan and connect, tcp 1433 (ms-sql-s) |
2020-02-19 08:08:49 |
| 103.214.157.69 | attackbots | Unauthorized connection attempt from IP address 103.214.157.69 on Port 445(SMB) |
2020-02-19 08:21:18 |
| 119.28.158.60 | attackbots | Invalid user guinevre from 119.28.158.60 port 54924 |
2020-02-19 08:03:43 |
| 122.3.49.253 | attackbots | Unauthorized connection attempt from IP address 122.3.49.253 on Port 445(SMB) |
2020-02-19 08:06:44 |
| 185.220.113.20 | attackbots | Email rejected due to spam filtering |
2020-02-19 08:22:52 |
| 46.229.168.144 | attackbotsspam | Malicious Traffic/Form Submission |
2020-02-19 08:16:27 |
| 193.32.161.31 | attack | 02/18/2020-19:09:07.923812 193.32.161.31 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-02-19 08:22:36 |
| 159.65.151.216 | attack | Feb 18 13:46:51 eddieflores sshd\[17799\]: Invalid user dsvmadmin from 159.65.151.216 Feb 18 13:46:51 eddieflores sshd\[17799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.151.216 Feb 18 13:46:53 eddieflores sshd\[17799\]: Failed password for invalid user dsvmadmin from 159.65.151.216 port 50998 ssh2 Feb 18 13:49:48 eddieflores sshd\[18011\]: Invalid user ftp_user1 from 159.65.151.216 Feb 18 13:49:48 eddieflores sshd\[18011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.151.216 |
2020-02-19 08:08:26 |
| 213.141.130.168 | attackbotsspam | Invalid user P2012DEV from 213.141.130.168 port 37870 |
2020-02-19 08:41:53 |
| 45.95.168.159 | attackspambots | Feb 19 00:19:02 mail postfix/smtpd\[13304\]: warning: unknown\[45.95.168.159\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Feb 19 00:20:33 mail postfix/smtpd\[13320\]: warning: unknown\[45.95.168.159\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Feb 19 00:58:11 mail postfix/smtpd\[13783\]: warning: unknown\[45.95.168.159\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Feb 19 00:59:41 mail postfix/smtpd\[13783\]: warning: unknown\[45.95.168.159\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2020-02-19 08:28:28 |