City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.131.189.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;12.131.189.200. IN A
;; AUTHORITY SECTION:
. 266 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 16:36:34 CST 2022
;; MSG SIZE rcvd: 107
200.189.131.12.in-addr.arpa domain name pointer A189-200.wifi.afes.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
200.189.131.12.in-addr.arpa name = A189-200.wifi.afes.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 190.177.174.133 | attackspambots | Unauthorised access (Oct 7) SRC=190.177.174.133 LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=60565 TCP DPT=8080 WINDOW=47948 SYN |
2019-10-08 02:11:09 |
| 195.96.253.142 | attack | vps1:pam-generic |
2019-10-08 02:10:41 |
| 192.169.189.120 | attackbotsspam | Automatic report - Banned IP Access |
2019-10-08 02:16:37 |
| 188.131.216.109 | attack | Automatic report - SSH Brute-Force Attack |
2019-10-08 02:26:37 |
| 120.92.89.35 | attackbotsspam | Port Scan: TCP/80 |
2019-10-08 02:36:00 |
| 201.244.0.160 | attackbots | php injection |
2019-10-08 02:29:57 |
| 14.102.146.52 | attackspam | Automatic report - XMLRPC Attack |
2019-10-08 02:40:35 |
| 65.169.38.229 | attackbots | IMAP |
2019-10-08 02:38:32 |
| 41.73.252.236 | attackspam | $f2bV_matches |
2019-10-08 02:29:32 |
| 101.255.52.171 | attackbotsspam | $f2bV_matches |
2019-10-08 02:25:42 |
| 89.136.1.24 | attack | " " |
2019-10-08 02:33:56 |
| 46.38.144.17 | attack | Oct 7 19:54:15 mail postfix/smtpd\[32474\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 7 19:55:31 mail postfix/smtpd\[30720\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 7 19:56:49 mail postfix/smtpd\[32450\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Oct 7 20:27:21 mail postfix/smtpd\[1804\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-10-08 02:28:26 |
| 138.186.1.26 | attackspambots | Oct 7 14:34:25 sauna sshd[225409]: Failed password for root from 138.186.1.26 port 53310 ssh2 ... |
2019-10-08 02:12:36 |
| 197.234.51.218 | attackspam | 07.10.2019 14:30:48 - RDP Login Fail Detected by https://www.elinox.de/RDP-Wächter |
2019-10-08 02:36:45 |
| 5.69.214.72 | attackbots | Forbidden directory scan :: 2019/10/07 22:38:44 [error] 1085#1085: *74808 access forbidden by rule, client: 5.69.214.72, server: [censored_1], request: "HEAD /.env HTTP/1.1", host: "[censored_1]" |
2019-10-08 02:17:35 |