City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.212.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23201
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.212.162. IN A
;; AUTHORITY SECTION:
. 162 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031701 1800 900 604800 86400
;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 18 07:28:54 CST 2022
;; MSG SIZE rcvd: 107
Host 162.212.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 162.212.21.104.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
45.129.33.8 | attackspambots |
|
2020-08-27 02:13:20 |
194.26.29.135 | attackbotsspam | Port-scan: detected 204 distinct ports within a 24-hour window. |
2020-08-27 02:29:26 |
80.82.78.39 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 65 - port: 8089 proto: tcp cat: Misc Attackbytes: 60 |
2020-08-27 02:39:11 |
45.145.66.22 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 23 - port: 31987 proto: tcp cat: Misc Attackbytes: 60 |
2020-08-27 02:10:35 |
45.129.33.26 | attackspam | port scans |
2020-08-27 02:11:31 |
14.35.44.115 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 7 - port: 9530 proto: tcp cat: Misc Attackbytes: 60 |
2020-08-27 02:28:07 |
92.118.161.9 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 77 - port: 1443 proto: tcp cat: Misc Attackbytes: 60 |
2020-08-27 02:06:19 |
106.12.209.81 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 92 - port: 22700 proto: tcp cat: Misc Attackbytes: 60 |
2020-08-27 02:34:13 |
106.13.104.8 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 93 - port: 5069 proto: tcp cat: Misc Attackbytes: 60 |
2020-08-27 02:04:47 |
71.6.199.23 | attackspambots |
|
2020-08-27 02:08:38 |
194.26.25.109 | attack | Port-scan: detected 194 distinct ports within a 24-hour window. |
2020-08-27 02:16:23 |
213.178.252.28 | attack | 2020-08-26T16:25:22.445755hostname sshd[36532]: Failed password for invalid user efm from 213.178.252.28 port 37310 ssh2 ... |
2020-08-27 02:15:42 |
2.57.122.98 | attackspam |
|
2020-08-27 02:15:21 |
45.129.33.16 | attack | Excessive Port-Scanning |
2020-08-27 02:12:29 |
107.170.204.148 | attack |
|
2020-08-27 02:33:43 |