City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.104.219.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15537
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.104.219.19. IN A
;; AUTHORITY SECTION:
. 150 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020601 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 12:18:48 CST 2022
;; MSG SIZE rcvd: 106
19.219.104.99.in-addr.arpa domain name pointer 99-104-219-19.uvs.irvnca.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
19.219.104.99.in-addr.arpa name = 99-104-219-19.uvs.irvnca.sbcglobal.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
165.227.51.249 | attackspambots | *Port Scan* detected from 165.227.51.249 (US/United States/California/Santa Clara/-). 4 hits in the last 235 seconds |
2020-04-26 01:47:42 |
129.211.97.151 | attack | 2020-04-25T13:53:44.012506shield sshd\[5642\]: Invalid user oracle from 129.211.97.151 port 35706 2020-04-25T13:53:44.016747shield sshd\[5642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.97.151 2020-04-25T13:53:45.830907shield sshd\[5642\]: Failed password for invalid user oracle from 129.211.97.151 port 35706 ssh2 2020-04-25T13:59:31.700473shield sshd\[7328\]: Invalid user postgres from 129.211.97.151 port 46966 2020-04-25T13:59:31.704240shield sshd\[7328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.97.151 |
2020-04-26 01:49:40 |
216.218.206.95 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-04-26 02:23:11 |
117.92.125.235 | attackspambots | trying to access non-authorized port |
2020-04-26 02:21:34 |
122.152.195.84 | attackbotsspam | Apr 25 13:48:55 ns382633 sshd\[3672\]: Invalid user english from 122.152.195.84 port 49890 Apr 25 13:48:55 ns382633 sshd\[3672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.195.84 Apr 25 13:48:58 ns382633 sshd\[3672\]: Failed password for invalid user english from 122.152.195.84 port 49890 ssh2 Apr 25 14:13:14 ns382633 sshd\[8671\]: Invalid user tablette from 122.152.195.84 port 51494 Apr 25 14:13:14 ns382633 sshd\[8671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.195.84 |
2020-04-26 01:54:07 |
46.34.227.238 | attackbots | Email rejected due to spam filtering |
2020-04-26 02:05:07 |
51.77.118.129 | attackspam | [2020-04-25 14:12:13] NOTICE[1170][C-0000544f] chan_sip.c: Call from '' (51.77.118.129:54397) to extension '900442037699171' rejected because extension not found in context 'public'. [2020-04-25 14:12:13] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-25T14:12:13.595-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="900442037699171",SessionID="0x7f6c080c3a88",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.77.118.129/54397",ACLName="no_extension_match" [2020-04-25 14:12:23] NOTICE[1170][C-00005450] chan_sip.c: Call from '' (51.77.118.129:60230) to extension '+442037699171' rejected because extension not found in context 'public'. [2020-04-25 14:12:23] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-25T14:12:23.031-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="+442037699171",SessionID="0x7f6c08101b78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.7 ... |
2020-04-26 02:17:21 |
50.116.101.52 | attackbots | Apr 25 07:44:48 server1 sshd\[795\]: Invalid user derek123 from 50.116.101.52 Apr 25 07:44:48 server1 sshd\[795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.116.101.52 Apr 25 07:44:50 server1 sshd\[795\]: Failed password for invalid user derek123 from 50.116.101.52 port 39282 ssh2 Apr 25 07:46:28 server1 sshd\[1312\]: Invalid user john from 50.116.101.52 Apr 25 07:46:28 server1 sshd\[1312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.116.101.52 ... |
2020-04-26 02:18:29 |
176.217.129.153 | attack | Email rejected due to spam filtering |
2020-04-26 02:26:41 |
67.207.86.195 | attackbotsspam | Unauthorized access to SSH at 25/Apr/2020:13:55:46 +0000. |
2020-04-26 01:56:22 |
78.38.91.97 | attackspambots | proto=tcp . spt=49290 . dpt=25 . Listed on truncate-gbudb also unsubscore and rbldns-ru (256) |
2020-04-26 02:08:58 |
114.221.154.202 | attackspam | Apr 25 14:09:38 ns382633 sshd\[7528\]: Invalid user julio from 114.221.154.202 port 26913 Apr 25 14:09:38 ns382633 sshd\[7528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.221.154.202 Apr 25 14:09:40 ns382633 sshd\[7528\]: Failed password for invalid user julio from 114.221.154.202 port 26913 ssh2 Apr 25 14:13:17 ns382633 sshd\[8680\]: Invalid user admin from 114.221.154.202 port 41281 Apr 25 14:13:17 ns382633 sshd\[8680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.221.154.202 |
2020-04-26 01:50:06 |
89.248.167.141 | attack | Apr 25 19:50:05 debian-2gb-nbg1-2 kernel: \[10095944.671759\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.167.141 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=3392 PROTO=TCP SPT=55793 DPT=5068 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-04-26 01:54:33 |
118.97.15.185 | attack | port scan and connect, tcp 1433 (ms-sql-s) |
2020-04-26 02:24:25 |
189.26.254.23 | attackbotsspam | 1587816783 - 04/25/2020 14:13:03 Host: 189.26.254.23/189.26.254.23 Port: 445 TCP Blocked |
2020-04-26 02:03:13 |