City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.107.181.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11712
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.107.181.10. IN A
;; AUTHORITY SECTION:
. 547 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400
;; Query time: 269 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 22:24:34 CST 2022
;; MSG SIZE rcvd: 107
10.181.107.106.in-addr.arpa domain name pointer 106.107.181.10.adsl.dynamic.seed.net.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
10.181.107.106.in-addr.arpa name = 106.107.181.10.adsl.dynamic.seed.net.tw.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 1.196.141.79 | attackbots | Unauthorized connection attempt detected from IP address 1.196.141.79 to port 139 [T] |
2020-05-20 09:10:38 |
| 106.245.191.206 | spamattack | This ip has been found to have been used for smishing purposes. |
2020-05-20 09:26:14 |
| 123.192.165.200 | attack | Honeypot attack, port: 81, PTR: 123-192-165-200.dynamic.kbronet.com.tw. |
2020-05-20 09:21:41 |
| 1.192.101.179 | attackspam | Unauthorized connection attempt detected from IP address 1.192.101.179 to port 139 [T] |
2020-05-20 09:13:18 |
| 49.115.77.197 | attackspam | Unauthorized connection attempt detected from IP address 49.115.77.197 to port 23 [T] |
2020-05-20 09:33:25 |
| 103.24.189.154 | attackspam | RDP Brute-Force (honeypot 13) |
2020-05-20 09:30:24 |
| 1.192.100.152 | attackspam | Unauthorized connection attempt detected from IP address 1.192.100.152 to port 139 [T] |
2020-05-20 09:37:54 |
| 1.196.142.251 | attackbots | Unauthorized connection attempt detected from IP address 1.196.142.251 to port 139 [T] |
2020-05-20 09:09:47 |
| 39.64.244.249 | attackbots | Unauthorized connection attempt detected from IP address 39.64.244.249 to port 22 [T] |
2020-05-20 09:35:11 |
| 1.196.142.226 | attackspam | Unauthorized connection attempt detected from IP address 1.196.142.226 to port 139 [T] |
2020-05-20 09:10:19 |
| 162.243.144.19 | attack | Unauthorized connection attempt detected from IP address 162.243.144.19 to port 5903 [T] |
2020-05-20 09:18:45 |
| 1.197.214.108 | attack | Unauthorized connection attempt detected from IP address 1.197.214.108 to port 139 [T] |
2020-05-20 09:05:50 |
| 36.99.247.119 | attackspam | Unauthorized connection attempt detected from IP address 36.99.247.119 to port 139 [T] |
2020-05-20 09:35:24 |
| 220.248.34.206 | attackspam | Unauthorized connection attempt detected from IP address 220.248.34.206 to port 23 [T] |
2020-05-20 09:15:33 |
| 36.99.245.201 | attackbots | Unauthorized connection attempt detected from IP address 36.99.245.201 to port 139 [T] |
2020-05-20 09:02:14 |