City: unknown
Region: unknown
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.139.10.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58479
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.139.10.122. IN A
;; AUTHORITY SECTION:
. 401 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022042300 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 24 01:05:28 CST 2022
;; MSG SIZE rcvd: 106
122.10.139.99.in-addr.arpa domain name pointer adsl-99-139-10-122.dsl.rcsntx.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
122.10.139.99.in-addr.arpa name = adsl-99-139-10-122.dsl.rcsntx.sbcglobal.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
176.107.129.109 | attackspam | 2020-01-29 07:28:56 H=famericana.brasilia.me (famericana-00) [176.107.129.109]:35554 I=[192.147.25.65]:25 F= |
2020-01-30 02:01:38 |
104.140.188.50 | attackbots | Unauthorized connection attempt detected from IP address 104.140.188.50 to port 5060 [J] |
2020-01-30 02:05:34 |
35.183.34.22 | attackspambots | webserver:80 [29/Jan/2020] "GET /.git/HEAD HTTP/1.1" 302 413 "-" "curl/7.47.0" webserver:80 [29/Jan/2020] "GET /.git/HEAD HTTP/1.1" 403 344 "-" "curl/7.47.0" |
2020-01-30 02:19:36 |
199.189.27.120 | attackspambots | 2019-03-01 06:41:24 H=circa.hasanhost.com \(circa.relaxorder.icu\) \[199.189.27.120\]:52021 I=\[193.107.88.166\]:25 sender verify fail for \ |
2020-01-30 02:38:02 |
138.197.105.79 | attackspam | Jan 29 13:27:47 ws22vmsma01 sshd[148120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.105.79 Jan 29 13:27:49 ws22vmsma01 sshd[148120]: Failed password for invalid user ubuntu from 138.197.105.79 port 41644 ssh2 ... |
2020-01-30 02:06:52 |
2.136.136.109 | attackbotsspam | 2019-10-23 23:28:39 1iNOBK-0001a7-Dj SMTP connection from 109.red-2-136-136.staticip.rima-tde.net \[2.136.136.109\]:48867 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-10-23 23:28:59 1iNOBd-0001aV-Pz SMTP connection from 109.red-2-136-136.staticip.rima-tde.net \[2.136.136.109\]:22496 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-10-23 23:29:13 1iNOBr-0001ao-Ke SMTP connection from 109.red-2-136-136.staticip.rima-tde.net \[2.136.136.109\]:49141 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 02:09:10 |
2.103.142.197 | attack | 2019-07-09 09:12:34 1hkkIU-0001fV-KZ SMTP connection from host-2-103-142-197.as13285.net \[2.103.142.197\]:46206 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-09 09:13:18 1hkkJM-0001gW-NE SMTP connection from host-2-103-142-197.as13285.net \[2.103.142.197\]:46338 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-09 09:13:57 1hkkJz-0001hB-J0 SMTP connection from host-2-103-142-197.as13285.net \[2.103.142.197\]:46430 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 02:26:00 |
2.132.108.4 | attackspam | 2019-03-11 12:55:33 1h3JWm-0007iI-4g SMTP connection from \(2.132.108.4.megaline.telecom.kz\) \[2.132.108.4\]:31012 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-11 12:55:53 1h3JX5-0007il-VI SMTP connection from \(2.132.108.4.megaline.telecom.kz\) \[2.132.108.4\]:31180 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-11 12:56:07 1h3JXK-0007jA-Rp SMTP connection from \(2.132.108.4.megaline.telecom.kz\) \[2.132.108.4\]:31296 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 02:19:53 |
199.189.27.99 | attackspam | 2019-02-28 01:13:50 1gz9Kg-0004XD-0K SMTP connection from influence.hasanhost.com \(influence.neutanix.icu\) \[199.189.27.99\]:57894 I=\[193.107.90.29\]:25 closed by DROP in ACL 2019-02-28 01:14:03 1gz9Ks-0004XR-Tw SMTP connection from influence.hasanhost.com \(influence.neutanix.icu\) \[199.189.27.99\]:48923 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-02-28 01:14:26 1gz9LG-0004Xl-0r SMTP connection from influence.hasanhost.com \(influence.neutanix.icu\) \[199.189.27.99\]:57518 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-07 09:40:20 1h1oZg-0008J2-Gd SMTP connection from influence.hasanhost.com \(influence.alibabaquotes.icu\) \[199.189.27.99\]:39176 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-07 09:41:08 1h1oaS-0008KX-0y SMTP connection from influence.hasanhost.com \(influence.alibabaquotes.icu\) \[199.189.27.99\]:49256 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-07 09:42:16 1h1obY-0008Mn-Ok SMTP connection from influence.hasanhost.com \(influence.al ... |
2020-01-30 02:26:47 |
199.189.27.121 | attackbotsspam | 2019-03-13 00:29:55 1h3qqJ-000448-NQ SMTP connection from gate.hasanhost.com \(gate.aplusagencynj.icu\) \[199.189.27.121\]:46601 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-13 00:30:20 1h3qqi-00046W-FG SMTP connection from gate.hasanhost.com \(gate.aplusagencynj.icu\) \[199.189.27.121\]:36120 I=\[193.107.90.29\]:25 closed by DROP in ACL 2019-03-13 00:33:07 1h3qtP-0004Ao-GD SMTP connection from gate.hasanhost.com \(gate.aplusagencynj.icu\) \[199.189.27.121\]:34631 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 02:36:45 |
210.212.189.82 | attackbots | Unauthorized connection attempt from IP address 210.212.189.82 on Port 445(SMB) |
2020-01-30 02:05:02 |
199.189.27.116 | attackbots | 2019-03-20 00:39:22 1h6OKI-0006Q9-6D SMTP connection from lactose.hasanhost.com \(lactose.radiotambo.icu\) \[199.189.27.116\]:52011 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-20 00:39:52 1h6OKm-0006Qe-3z SMTP connection from lactose.hasanhost.com \(lactose.radiotambo.icu\) \[199.189.27.116\]:40200 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-20 00:42:08 1h6OMy-0006Uf-8h SMTP connection from lactose.hasanhost.com \(lactose.radiotambo.icu\) \[199.189.27.116\]:36585 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-30 02:42:58 |
189.126.193.82 | attackspam | Unauthorized connection attempt from IP address 189.126.193.82 on Port 445(SMB) |
2020-01-30 02:03:07 |
171.5.233.177 | attackbots | Unauthorized connection attempt from IP address 171.5.233.177 on Port 445(SMB) |
2020-01-30 02:37:03 |
36.75.143.206 | attack | 445/tcp [2020-01-29]1pkt |
2020-01-30 02:29:26 |