City: Boardman
Region: Oregon
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.22.1.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;100.22.1.130. IN A
;; AUTHORITY SECTION:
. 227 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022041201 1800 900 604800 86400
;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 13 10:03:29 CST 2022
;; MSG SIZE rcvd: 105
130.1.22.100.in-addr.arpa domain name pointer ec2-100-22-1-130.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
130.1.22.100.in-addr.arpa name = ec2-100-22-1-130.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
197.249.52.210 | attack | 445/tcp 445/tcp 445/tcp... [2019-05-27/07-24]10pkt,1pt.(tcp) |
2019-07-25 03:15:31 |
114.38.10.71 | attack | " " |
2019-07-25 03:24:05 |
133.155.50.235 | attack | DATE:2019-07-24 18:45:34, IP:133.155.50.235, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc) |
2019-07-25 02:53:52 |
23.94.17.122 | attackbots | CloudCIX Reconnaissance Scan Detected, PTR: 23-94-17-122-host.colocrossing.com. |
2019-07-25 03:15:08 |
2.191.99.192 | attackbotsspam | Telnetd brute force attack detected by fail2ban |
2019-07-25 03:33:17 |
200.68.36.42 | attackspam | 445/tcp 445/tcp 445/tcp... [2019-05-31/07-24]10pkt,1pt.(tcp) |
2019-07-25 03:14:10 |
58.214.13.42 | attackbots | SSH Bruteforce @ SigaVPN honeypot |
2019-07-25 03:00:15 |
83.235.176.144 | attackspam | 445/tcp 445/tcp 445/tcp... [2019-06-13/07-24]11pkt,1pt.(tcp) |
2019-07-25 03:00:41 |
45.13.39.123 | attackbots | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-07-25 03:13:42 |
49.88.112.71 | attack | Jul 24 18:43:38 icinga sshd[25614]: Failed password for root from 49.88.112.71 port 57202 ssh2 Jul 24 18:43:42 icinga sshd[25614]: Failed password for root from 49.88.112.71 port 57202 ssh2 Jul 24 18:43:47 icinga sshd[25614]: Failed password for root from 49.88.112.71 port 57202 ssh2 ... |
2019-07-25 03:20:39 |
139.162.127.127 | attackspambots | " " |
2019-07-25 03:40:22 |
121.142.111.226 | attackbotsspam | $f2bV_matches |
2019-07-25 03:03:52 |
77.247.110.157 | attackbotsspam | Scanning random ports - tries to find possible vulnerable services |
2019-07-25 03:17:50 |
122.226.136.6 | attack | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-07-25 03:38:55 |
77.247.109.39 | attackspambots | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found |
2019-07-25 03:37:36 |