City: unknown
Region: unknown
Country: Korea (the Republic of)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.161.33.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8562
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;112.161.33.34. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 01:48:53 CST 2025
;; MSG SIZE rcvd: 106
Host 34.33.161.112.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 34.33.161.112.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
81.20.204.126 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:38. |
2019-09-28 00:39:10 |
42.118.6.134 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:26. |
2019-09-28 01:01:01 |
45.76.215.166 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:28. |
2019-09-28 00:58:00 |
103.31.13.0 | attack | " " |
2019-09-28 00:44:11 |
221.214.201.225 | attackspam | (Sep 27) LEN=40 TTL=49 ID=11424 TCP DPT=8080 WINDOW=32767 SYN (Sep 27) LEN=40 TTL=49 ID=22960 TCP DPT=8080 WINDOW=48972 SYN (Sep 27) LEN=40 TTL=49 ID=31558 TCP DPT=8080 WINDOW=48972 SYN (Sep 27) LEN=40 TTL=49 ID=57347 TCP DPT=8080 WINDOW=13357 SYN (Sep 27) LEN=40 TTL=49 ID=24546 TCP DPT=8080 WINDOW=48972 SYN (Sep 27) LEN=40 TTL=49 ID=57712 TCP DPT=8080 WINDOW=54308 SYN (Sep 26) LEN=40 TTL=49 ID=47100 TCP DPT=8080 WINDOW=48532 SYN (Sep 26) LEN=40 TTL=49 ID=61947 TCP DPT=8080 WINDOW=48972 SYN (Sep 25) LEN=40 TTL=49 ID=1254 TCP DPT=8080 WINDOW=15108 SYN (Sep 25) LEN=40 TTL=49 ID=35329 TCP DPT=8080 WINDOW=54308 SYN (Sep 24) LEN=40 TTL=49 ID=42551 TCP DPT=8080 WINDOW=13357 SYN (Sep 24) LEN=40 TTL=48 ID=4490 TCP DPT=8080 WINDOW=54308 SYN (Sep 24) LEN=40 TTL=48 ID=22383 TCP DPT=8080 WINDOW=48532 SYN (Sep 24) LEN=40 TTL=48 ID=57829 TCP DPT=8080 WINDOW=32767 SYN |
2019-09-28 01:01:51 |
58.59.97.242 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:34. |
2019-09-28 00:48:43 |
47.30.254.81 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:30. |
2019-09-28 00:55:56 |
36.75.158.198 | attackspambots | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:21. |
2019-09-28 01:12:57 |
159.203.201.85 | attackspam | firewall-block, port(s): 60383/tcp |
2019-09-28 01:08:19 |
131.221.80.129 | attackbots | Automated report - ssh fail2ban: Sep 27 17:31:05 authentication failure Sep 27 17:31:07 wrong password, user=git, port=2241, ssh2 Sep 27 17:35:43 authentication failure |
2019-09-28 00:23:30 |
113.172.225.180 | attackbotsspam | Chat Spam |
2019-09-28 00:39:33 |
42.118.6.34 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:26. |
2019-09-28 01:01:35 |
86.57.161.131 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:41. |
2019-09-28 00:33:02 |
95.56.105.28 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:47. |
2019-09-28 00:24:08 |
93.110.55.250 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:46. |
2019-09-28 00:25:31 |