City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.12.219.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.12.219.245. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 10:14:03 CST 2025
;; MSG SIZE rcvd: 106
245.219.12.99.in-addr.arpa domain name pointer 99-12-219-245.lightspeed.hstntx.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
245.219.12.99.in-addr.arpa name = 99-12-219-245.lightspeed.hstntx.sbcglobal.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 93.181.200.164 | attackspam | " " |
2019-10-02 23:46:02 |
| 77.247.108.77 | attackspambots | Portscan or hack attempt detected by psad/fwsnort |
2019-10-02 23:53:36 |
| 117.177.86.147 | attack | Fail2Ban - FTP Abuse Attempt |
2019-10-03 00:35:13 |
| 91.121.94.121 | attackbotsspam | Host tried to access restricted Magento downloader folder /downloader |
2019-10-03 00:14:11 |
| 132.145.16.205 | attack | SSH Bruteforce attempt |
2019-10-03 00:06:09 |
| 103.24.109.174 | attackbotsspam | Unauthorized connection attempt from IP address 103.24.109.174 on Port 445(SMB) |
2019-10-03 00:04:11 |
| 136.144.142.177 | attackbots | fail2ban |
2019-10-03 00:34:33 |
| 82.60.173.92 | attackbots | Honeypot attack, port: 23, PTR: host92-173-dynamic.60-82-r.retail.telecomitalia.it. |
2019-10-02 23:58:39 |
| 145.239.88.43 | attackspam | Oct 2 03:04:22 php1 sshd\[28181\]: Invalid user teamspeak3 from 145.239.88.43 Oct 2 03:04:22 php1 sshd\[28181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.88.43 Oct 2 03:04:23 php1 sshd\[28181\]: Failed password for invalid user teamspeak3 from 145.239.88.43 port 46106 ssh2 Oct 2 03:09:00 php1 sshd\[28541\]: Invalid user mprint from 145.239.88.43 Oct 2 03:09:00 php1 sshd\[28541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.88.43 |
2019-10-03 00:08:09 |
| 219.149.190.234 | attack | Unauthorized connection attempt from IP address 219.149.190.234 on Port 445(SMB) |
2019-10-03 00:20:09 |
| 45.142.195.5 | attackspambots | Oct 2 17:35:15 mail postfix/smtpd\[7464\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 2 17:35:54 mail postfix/smtpd\[8369\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 2 18:06:01 mail postfix/smtpd\[10678\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 2 18:06:41 mail postfix/smtpd\[9871\]: warning: unknown\[45.142.195.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-10-03 00:06:58 |
| 222.186.173.201 | attackbots | Automated report - ssh fail2ban: Oct 2 17:25:49 wrong password, user=root, port=35870, ssh2 Oct 2 17:25:53 wrong password, user=root, port=35870, ssh2 Oct 2 17:25:58 wrong password, user=root, port=35870, ssh2 Oct 2 17:26:04 wrong password, user=root, port=35870, ssh2 |
2019-10-02 23:48:11 |
| 146.185.202.159 | attackspambots | B: zzZZzz blocked content access |
2019-10-02 23:49:59 |
| 94.233.229.38 | attackspambots | Automatic report - Port Scan Attack |
2019-10-02 23:47:48 |
| 123.252.197.74 | attack | Unauthorized connection attempt from IP address 123.252.197.74 on Port 445(SMB) |
2019-10-03 00:30:53 |