City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.13.144.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.13.144.172.			IN	A
;; AUTHORITY SECTION:
.			297	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400
;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:46:44 CST 2022
;; MSG SIZE  rcvd: 107
        172.144.13.107.in-addr.arpa domain name pointer mta-107-13-144-172.nc.rr.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
172.144.13.107.in-addr.arpa	name = mta-107-13-144-172.nc.rr.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 200.71.73.242 | attackbotsspam | Absender hat Spam-Falle ausgel?st  | 
                    2020-01-10 20:27:04 | 
| 81.227.17.83 | attackbots | (imapd) Failed IMAP login from 81.227.17.83 (SE/Sweden/81-227-17-83-no2800.tbcn.telia.com): 1 in the last 3600 secs  | 
                    2020-01-10 20:04:50 | 
| 63.81.87.175 | attack | Jan 10 05:48:09 grey postfix/smtpd\[18402\]: NOQUEUE: reject: RCPT from health.jcnovel.com\[63.81.87.175\]: 554 5.7.1 Service unavailable\; Client host \[63.81.87.175\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.81.87.175\]\; from=\  | 
                    2020-01-10 20:01:53 | 
| 97.90.49.141 | attackbotsspam | spam  | 
                    2020-01-10 20:24:29 | 
| 171.4.123.100 | attackspam | 1578631687 - 01/10/2020 05:48:07 Host: 171.4.123.100/171.4.123.100 Port: 445 TCP Blocked  | 
                    2020-01-10 20:04:22 | 
| 23.251.42.20 | attackbotsspam | $f2bV_matches  | 
                    2020-01-10 20:01:13 | 
| 202.152.43.250 | attackbots | Jan 10 04:31:00 wildwolf ssh-honeypotd[26164]: Failed password for Adminixxxr from 202.152.43.250 port 65086 ssh2 (target: 158.69.100.153:22, password: admin@wlan) Jan 10 04:31:00 wildwolf ssh-honeypotd[26164]: Failed password for Adminixxxr from 202.152.43.250 port 65104 ssh2 (target: 158.69.100.151:22, password: admin@wlan) Jan 10 04:31:00 wildwolf ssh-honeypotd[26164]: Failed password for Adminixxxr from 202.152.43.250 port 65090 ssh2 (target: 158.69.100.134:22, password: admin@wlan) Jan 10 04:31:00 wildwolf ssh-honeypotd[26164]: Failed password for Adminixxxr from 202.152.43.250 port 64689 ssh2 (target: 158.69.100.154:22, password: admin@wlan) Jan 10 04:31:00 wildwolf ssh-honeypotd[26164]: Failed password for Adminixxxr from 202.152.43.250 port 65153 ssh2 (target: 158.69.100.145:22, password: admin@wlan) Jan 10 04:31:00 wildwolf ssh-honeypotd[26164]: Failed password for Adminixxxr from 202.152.43.250 port 65355 ssh2 (target: 158.69.100.133:22, password: admin@wlan) J........ ------------------------------  | 
                    2020-01-10 20:17:54 | 
| 108.162.237.82 | attack | 8080/tcp 8443/tcp... [2019-11-22/2020-01-10]16pkt,2pt.(tcp)  | 
                    2020-01-10 20:21:34 | 
| 118.89.215.65 | attackspambots | WordPress wp-login brute force :: 118.89.215.65 0.192 - [10/Jan/2020:09:57:50 0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1806 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"  | 
                    2020-01-10 20:10:59 | 
| 175.147.195.74 | attackbotsspam | 23/tcp 23/tcp [2020-01-08/10]2pkt  | 
                    2020-01-10 20:03:48 | 
| 109.245.241.89 | attackspambots | spam  | 
                    2020-01-10 20:34:45 | 
| 37.49.225.140 | attackspam | 22/tcp 22/tcp 22/tcp... [2019-11-13/2020-01-10]17pkt,1pt.(tcp)  | 
                    2020-01-10 20:02:23 | 
| 109.101.196.50 | attack | email spam  | 
                    2020-01-10 20:35:04 | 
| 190.99.76.98 | attack | spam  | 
                    2020-01-10 20:29:05 | 
| 138.99.216.171 | attackspambots | IP: 138.99.216.171
Ports affected
    Simple Mail Transfer (25) 
    http protocol over TLS/SSL (443) 
    Message Submission (587) 
    World Wide Web HTTP (80) 
    IMAP over TLS protocol (993) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS43350 NForce Entertainment B.V.
   Belize (BZ)
   CIDR 138.99.216.0/24
Log Date: 10/01/2020 8:08:27 AM UTC | 
                    2020-01-10 20:00:35 |