City: Oklahoma City
Region: Oklahoma
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.172.166.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50281
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.172.166.11. IN A
;; AUTHORITY SECTION:
. 315 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020082201 1800 900 604800 86400
;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 23 08:31:40 CST 2020
;; MSG SIZE rcvd: 117
11.166.172.99.in-addr.arpa domain name pointer 99-172-166-11.lightspeed.okcbok.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
11.166.172.99.in-addr.arpa name = 99-172-166-11.lightspeed.okcbok.sbcglobal.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
14.187.221.10 | attackbotsspam | 2019-06-22 15:11:51 1hefo3-00062S-7R SMTP connection from \(static.vnpt.vn\) \[14.187.221.10\]:13152 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-22 15:12:26 1hefoe-00063E-J2 SMTP connection from \(static.vnpt.vn\) \[14.187.221.10\]:13359 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-06-22 15:12:41 1hefou-00063U-70 SMTP connection from \(static.vnpt.vn\) \[14.187.221.10\]:13455 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-04 22:15:47 |
14.182.68.198 | attackbots | 2019-03-08 11:54:03 1h2D8d-00072s-6K SMTP connection from \(static.vnpt.vn\) \[14.182.68.198\]:49945 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-08 11:54:31 1h2D94-00073V-No SMTP connection from \(static.vnpt.vn\) \[14.182.68.198\]:10135 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-03-08 11:54:45 1h2D9I-00073p-Fl SMTP connection from \(static.vnpt.vn\) \[14.182.68.198\]:10238 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-04 22:33:34 |
198.108.66.96 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-04 22:26:53 |
190.64.204.140 | attackbotsspam | 2020-02-04T15:17:06.286775scmdmz1 sshd[6004]: Invalid user julios from 190.64.204.140 port 52105 2020-02-04T15:17:06.290639scmdmz1 sshd[6004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.204.140 2020-02-04T15:17:06.286775scmdmz1 sshd[6004]: Invalid user julios from 190.64.204.140 port 52105 2020-02-04T15:17:07.811924scmdmz1 sshd[6004]: Failed password for invalid user julios from 190.64.204.140 port 52105 ssh2 2020-02-04T15:20:28.712730scmdmz1 sshd[6321]: Invalid user user3 from 190.64.204.140 port 35886 ... |
2020-02-04 22:34:23 |
81.22.45.182 | attackspam | Feb 4 15:52:28 mail kernel: [237408.614381] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=81.22.45.182 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=57208 PROTO=TCP SPT=50336 DPT=10897 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2020-02-04 22:58:24 |
14.171.89.115 | attackspam | 2019-09-16 09:51:29 1i9lnE-0004kc-MD SMTP connection from \(static.vnpt.vn\) \[14.171.89.115\]:26489 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-16 09:51:32 1i9lnH-0004kf-Q4 SMTP connection from \(static.vnpt.vn\) \[14.171.89.115\]:26511 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-16 09:51:35 1i9lnK-0004km-Ns SMTP connection from \(static.vnpt.vn\) \[14.171.89.115\]:26520 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-04 22:51:36 |
188.36.146.149 | attackbotsspam | Unauthorized connection attempt detected from IP address 188.36.146.149 to port 2220 [J] |
2020-02-04 22:22:39 |
172.69.68.177 | attackbots | SQL injection:/newsites/free/pierre/search/searchSVI.php?continentName=EU+-6863+union+all+select+1,1,1,CONCAT(0x3a6f79753a,0x4244764877697569706b,0x3a70687a3a)1,1,1%23&country=276+&prj_typ=all&startdate=&enddate=&from=&page=1&searchSubmission=Recherche |
2020-02-04 22:50:47 |
179.124.36.196 | attack | Feb 4 04:41:30 hpm sshd\[3742\]: Invalid user percev from 179.124.36.196 Feb 4 04:41:30 hpm sshd\[3742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.124.36.196 Feb 4 04:41:32 hpm sshd\[3742\]: Failed password for invalid user percev from 179.124.36.196 port 33969 ssh2 Feb 4 04:44:56 hpm sshd\[4209\]: Invalid user unix from 179.124.36.196 Feb 4 04:44:56 hpm sshd\[4209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.124.36.196 |
2020-02-04 22:55:41 |
14.176.69.172 | attackbots | 2020-01-25 10:13:39 1ivHVa-0002Ad-9u SMTP connection from \(static.vnpt.vn\) \[14.176.69.172\]:10550 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-01-25 10:14:03 1ivHVy-0002BI-5Q SMTP connection from \(static.vnpt.vn\) \[14.176.69.172\]:10721 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-01-25 10:14:22 1ivHWH-0002Ba-7d SMTP connection from \(static.vnpt.vn\) \[14.176.69.172\]:10830 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-04 22:39:58 |
14.166.174.72 | attackspam | 2019-07-07 08:54:51 1hk14U-0000fT-N5 SMTP connection from \(static.vnpt.vn\) \[14.166.174.72\]:11105 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-07 08:55:20 1hk14x-0000hJ-6r SMTP connection from \(static.vnpt.vn\) \[14.166.174.72\]:11272 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-07 08:55:41 1hk15H-0000ha-O7 SMTP connection from \(static.vnpt.vn\) \[14.166.174.72\]:11394 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-02-04 23:03:04 |
198.108.66.97 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-04 22:22:06 |
139.59.224.32 | attackbotsspam | $f2bV_matches |
2020-02-04 23:04:45 |
222.64.109.33 | attackbotsspam | Unauthorized connection attempt detected from IP address 222.64.109.33 to port 2220 [J] |
2020-02-04 22:16:11 |
96.68.169.189 | attackbotsspam | Feb 4 14:46:38 DAAP sshd[19398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.68.169.189 user=root Feb 4 14:46:39 DAAP sshd[19398]: Failed password for root from 96.68.169.189 port 59395 ssh2 Feb 4 14:52:51 DAAP sshd[19458]: Invalid user fq from 96.68.169.189 port 51212 Feb 4 14:52:51 DAAP sshd[19458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.68.169.189 Feb 4 14:52:51 DAAP sshd[19458]: Invalid user fq from 96.68.169.189 port 51212 Feb 4 14:52:53 DAAP sshd[19458]: Failed password for invalid user fq from 96.68.169.189 port 51212 ssh2 ... |
2020-02-04 22:23:15 |