City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.196.103.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.196.103.33. IN A
;; AUTHORITY SECTION:
. 379 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:26:12 CST 2022
;; MSG SIZE rcvd: 107
33.103.196.104.in-addr.arpa domain name pointer 33.103.196.104.bc.googleusercontent.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
33.103.196.104.in-addr.arpa name = 33.103.196.104.bc.googleusercontent.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.143.220.48 | attack | Multiport scan : 5 ports scanned 5090 5091 5092 5160 5260 |
2020-04-11 08:33:34 |
| 222.173.203.221 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-11 08:03:47 |
| 87.251.74.12 | attackbotsspam | Port-scan: detected 168 distinct ports within a 24-hour window. |
2020-04-11 08:20:30 |
| 37.49.226.3 | attack | 8443/tcp 5038/tcp 50802/tcp... [2020-02-12/04-10]130pkt,5pt.(tcp) |
2020-04-11 08:35:01 |
| 103.145.12.43 | attackbots | ET SCAN Sipvicious Scan - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-04-11 08:11:38 |
| 222.186.52.35 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-11 08:03:21 |
| 104.206.128.58 | attack | GPL SNMP public access udp - port: 161 proto: UDP cat: Attempted Information Leak |
2020-04-11 08:10:54 |
| 95.85.12.122 | attackbotsspam | firewall-block, port(s): 4696/tcp |
2020-04-11 08:12:41 |
| 80.82.78.211 | attack | firewall-block, port(s): 52001/tcp, 53321/tcp |
2020-04-11 08:21:38 |
| 107.6.183.166 | attackbotsspam | 21/tcp 3306/tcp 2082/tcp... [2020-02-15/04-10]13pkt,9pt.(tcp),3pt.(udp) |
2020-04-11 08:10:14 |
| 111.223.49.134 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-11 08:09:52 |
| 80.82.77.139 | attack | Fail2Ban Ban Triggered |
2020-04-11 08:22:13 |
| 43.245.222.163 | attackbots | Apr 10 23:34:30 debian-2gb-nbg1-2 kernel: \[8813476.384989\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=43.245.222.163 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=112 ID=50175 PROTO=TCP SPT=16655 DPT=3389 WINDOW=18770 RES=0x00 SYN URGP=0 |
2020-04-11 08:34:32 |
| 42.80.15.52 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-11 07:59:04 |
| 106.18.137.11 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-11 08:10:33 |