City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.12.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40187
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.12.128. IN A
;; AUTHORITY SECTION:
. 598 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 17:43:57 CST 2022
;; MSG SIZE rcvd: 106
Host 128.12.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 128.12.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
169.197.108.203 | attackbotsspam | Port 80 (HTTP) access denied |
2020-03-25 19:39:59 |
162.243.130.108 | attackspam | Honeypot hit. |
2020-03-25 19:45:27 |
45.55.32.34 | attackspam | Fail2Ban Ban Triggered |
2020-03-25 19:11:24 |
198.108.66.234 | attackspambots | 8385/tcp 9072/tcp 9351/tcp... [2020-01-26/03-25]99pkt,95pt.(tcp),1tp.(icmp) |
2020-03-25 20:11:06 |
193.32.163.9 | attack | firewall-block, port(s): 1051/tcp |
2020-03-25 19:23:44 |
221.207.32.250 | attack | 22/tcp 22/tcp 22/tcp... [2020-01-24/03-25]60pkt,1pt.(tcp) |
2020-03-25 20:05:13 |
112.90.197.66 | attack | 03/25/2020-07:45:58.484036 112.90.197.66 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-25 19:54:09 |
185.175.93.101 | attackbotsspam | 03/25/2020-03:16:05.237437 185.175.93.101 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-03-25 19:33:12 |
198.108.66.238 | attackspam | firewall-block, port(s): 9722/tcp |
2020-03-25 19:17:47 |
162.243.132.62 | attackbots | Mar 25 10:47:43 *** sshd[28619]: Did not receive identification string from 162.243.132.62 |
2020-03-25 19:42:16 |
212.129.17.32 | attackspambots | SIPVicious Scanner Detection |
2020-03-25 19:16:26 |
139.219.6.50 | attackbots | Unauthorized connection attempt detected from IP address 139.219.6.50 to port 8251 [T] |
2020-03-25 19:51:52 |
88.214.26.53 | attackspambots | firewall-block, port(s): 45689/tcp |
2020-03-25 19:57:07 |
128.14.137.181 | attackspam | Port 9200 scan denied |
2020-03-25 19:52:37 |
192.241.237.45 | attack | Port 995 scan denied |
2020-03-25 19:29:49 |