City: Sydney
Region: New South Wales
Country: Australia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.139.48.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.139.48.14. IN A
;; AUTHORITY SECTION:
. 349 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022040600 1800 900 604800 86400
;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 06 22:33:15 CST 2022
;; MSG SIZE rcvd: 106
b';; connection timed out; no servers could be reached
'
server can't find 103.139.48.14.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
185.144.78.20 | attackbots | Port Scan: TCP/443 |
2019-09-25 08:51:26 |
207.182.65.251 | attack | Port Scan: UDP/137 |
2019-09-25 09:01:14 |
41.46.59.1 | attackbotsspam | Port Scan: TCP/23 |
2019-09-25 09:26:18 |
187.69.184.217 | attack | Port Scan: TCP/445 |
2019-09-25 09:02:46 |
103.69.251.26 | attackbots | Port Scan: TCP/8080 |
2019-09-25 09:08:45 |
66.194.27.57 | attackspam | Port Scan: TCP/445 |
2019-09-25 09:09:46 |
60.4.184.188 | attackspam | Port Scan: TCP/23 |
2019-09-25 08:58:03 |
216.201.150.198 | attack | Port Scan: UDP/137 |
2019-09-25 09:14:51 |
162.251.15.230 | attackspam | Port Scan: UDP/137 |
2019-09-25 09:05:03 |
12.151.172.122 | attackbots | Port Scan: UDP/137 |
2019-09-25 09:00:02 |
200.53.20.251 | attackspam | Port Scan: TCP/8080 |
2019-09-25 09:16:09 |
182.126.79.179 | attackspambots | port 23 attempt blocked |
2019-09-25 09:03:49 |
187.115.25.49 | attack | Port Scan: UDP/69 |
2019-09-25 08:50:50 |
222.119.56.81 | attackspambots | Trying ports that it shouldn't be. |
2019-09-25 09:14:36 |
155.254.30.234 | attack | Port Scan: TCP/445 |
2019-09-25 09:06:21 |