City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.239.160.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22971
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;122.239.160.94.			IN	A
;; AUTHORITY SECTION:
.			387	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:34:42 CST 2022
;; MSG SIZE  rcvd: 107Host 94.160.239.122.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 94.160.239.122.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 185.39.11.59 | attack | Port scan: Attack repeated for 24 hours | 2020-06-21 07:35:05 | 
| 185.209.0.32 | attackbotsspam | ET DROP Dshield Block Listed Source group 1 - port: 33889 proto: TCP cat: Misc Attack | 2020-06-21 07:51:54 | 
| 87.251.74.213 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 82 - port: 2976 proto: TCP cat: Misc Attack | 2020-06-21 07:26:14 | 
| 94.102.51.95 | attackspam | Triggered: repeated knocking on closed ports. | 2020-06-21 07:39:30 | 
| 51.210.15.231 | attack | Jun 21 01:39:26 debian-2gb-nbg1-2 kernel: \[14955048.539397\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.210.15.231 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=38894 PROTO=TCP SPT=43404 DPT=5903 WINDOW=1024 RES=0x00 SYN URGP=0 | 2020-06-21 07:45:57 | 
| 115.178.119.110 | attackspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic | 2020-06-21 07:38:12 | 
| 185.39.11.55 | attackspambots | [MK-VM1] Blocked by UFW | 2020-06-21 07:35:56 | 
| 37.49.225.166 | attack | Unauthorized connection attempt detected from IP address 37.49.225.166 to port 81 | 2020-06-21 07:49:03 | 
| 89.248.172.85 | attackspam | firewall-block, port(s): 3378/tcp, 3402/tcp, 3403/tcp, 3423/tcp, 3424/tcp, 3426/tcp, 10289/tcp, 44215/tcp | 2020-06-21 07:40:48 | 
| 83.97.20.31 | attackspam | Jun 21 01:25:10 debian-2gb-nbg1-2 kernel: \[14954192.904050\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=83.97.20.31 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=58647 DPT=1433 WINDOW=65535 RES=0x00 SYN URGP=0 | 2020-06-21 07:44:54 | 
| 121.132.215.233 | attack | Honeypot attack, port: 81, PTR: PTR record not found | 2020-06-21 07:37:42 | 
| 36.156.159.216 | attackbotsspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic | 2020-06-21 07:32:10 | 
| 122.49.30.48 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic | 2020-06-21 07:56:56 | 
| 45.88.104.99 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 30 - port: 9115 proto: TCP cat: Misc Attack | 2020-06-21 07:48:48 | 
| 83.97.20.224 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 77 - port: 27017 proto: TCP cat: Misc Attack | 2020-06-21 07:43:57 |