City: McKinney
Region: Texas
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.71.210.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5199
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;99.71.210.30. IN A
;; AUTHORITY SECTION:
. 520 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023100700 1800 900 604800 86400
;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 08 01:42:42 CST 2023
;; MSG SIZE rcvd: 105
30.210.71.99.in-addr.arpa domain name pointer 99-71-210-30.lightspeed.mckntx.sbcglobal.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
30.210.71.99.in-addr.arpa name = 99-71-210-30.lightspeed.mckntx.sbcglobal.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
176.113.251.232 | attack | Forum Spammer |
2020-04-23 02:50:34 |
80.244.187.181 | attackbots | Invalid user test from 80.244.187.181 port 43622 |
2020-04-23 03:17:17 |
42.114.249.7 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-04-23 02:49:35 |
51.75.76.201 | attackbots | SSH Bruteforce attack |
2020-04-23 03:21:16 |
122.51.158.15 | attackspambots | Apr 22 16:52:10 srv206 sshd[5964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.158.15 user=root Apr 22 16:52:12 srv206 sshd[5964]: Failed password for root from 122.51.158.15 port 43048 ssh2 Apr 22 17:00:54 srv206 sshd[6008]: Invalid user admin from 122.51.158.15 ... |
2020-04-23 02:52:54 |
42.200.66.164 | attackbotsspam | k+ssh-bruteforce |
2020-04-23 02:54:02 |
123.25.25.53 | attackbots | Invalid user system from 123.25.25.53 port 50127 |
2020-04-23 03:08:32 |
202.158.48.106 | attackspam | no |
2020-04-23 03:02:00 |
203.245.41.96 | attackspambots | Apr 22 18:21:12 ws25vmsma01 sshd[216193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.245.41.96 Apr 22 18:21:15 ws25vmsma01 sshd[216193]: Failed password for invalid user admin from 203.245.41.96 port 52424 ssh2 ... |
2020-04-23 03:01:25 |
138.68.44.236 | attack | Apr 22 20:21:49 ns382633 sshd\[4352\]: Invalid user postgres from 138.68.44.236 port 35066 Apr 22 20:21:49 ns382633 sshd\[4352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.236 Apr 22 20:21:51 ns382633 sshd\[4352\]: Failed password for invalid user postgres from 138.68.44.236 port 35066 ssh2 Apr 22 20:33:42 ns382633 sshd\[6458\]: Invalid user ftpuser from 138.68.44.236 port 40036 Apr 22 20:33:42 ns382633 sshd\[6458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.236 |
2020-04-23 02:43:59 |
118.174.45.29 | attackbots | Apr 22 20:15:40 roki-contabo sshd\[25880\]: Invalid user cq from 118.174.45.29 Apr 22 20:15:40 roki-contabo sshd\[25880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.45.29 Apr 22 20:15:42 roki-contabo sshd\[25880\]: Failed password for invalid user cq from 118.174.45.29 port 60080 ssh2 Apr 22 20:21:32 roki-contabo sshd\[25972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.45.29 user=root Apr 22 20:21:34 roki-contabo sshd\[25972\]: Failed password for root from 118.174.45.29 port 32790 ssh2 ... |
2020-04-23 03:09:15 |
218.4.163.146 | attackspambots | Invalid user ubuntu from 218.4.163.146 port 35249 |
2020-04-23 02:59:29 |
91.134.142.57 | attack | "XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES: |
2020-04-23 02:46:33 |
101.71.129.8 | attackbots | SSH brute force attempt |
2020-04-23 02:56:57 |
47.112.127.29 | attack | Apr 22 14:57:45 lukav-desktop sshd\[15745\]: Invalid user wg from 47.112.127.29 Apr 22 14:57:45 lukav-desktop sshd\[15745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.112.127.29 Apr 22 14:57:47 lukav-desktop sshd\[15745\]: Failed password for invalid user wg from 47.112.127.29 port 40570 ssh2 Apr 22 14:59:53 lukav-desktop sshd\[15866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.112.127.29 user=root Apr 22 14:59:55 lukav-desktop sshd\[15866\]: Failed password for root from 47.112.127.29 port 34446 ssh2 |
2020-04-23 02:46:55 |