City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.5.170.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55525
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;123.5.170.234.			IN	A
;; AUTHORITY SECTION:
.			163	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400
;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:37:18 CST 2022
;; MSG SIZE  rcvd: 106
        234.170.5.123.in-addr.arpa domain name pointer hn.kd.ny.adsl.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
234.170.5.123.in-addr.arpa	name = hn.kd.ny.adsl.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 93.189.95.182 | attack | Port probing on unauthorized port 3629  | 
                    2020-02-20 03:28:24 | 
| 36.237.85.8 | attack | Honeypot attack, port: 445, PTR: 36-237-85-8.dynamic-ip.hinet.net.  | 
                    2020-02-20 03:14:30 | 
| 85.93.60.69 | attackspambots | 20/2/19@09:36:55: FAIL: Alarm-Network address from=85.93.60.69 ...  | 
                    2020-02-20 03:19:34 | 
| 2.17.7.93 | attackspambots | firewall-block, port(s): 50411/tcp, 56280/tcp, 62640/tcp, 62908/tcp, 62961/tcp, 64043/tcp  | 
                    2020-02-20 03:33:42 | 
| 61.219.11.153 | attack | firewall-block, port(s): 80/tcp  | 
                    2020-02-20 03:20:33 | 
| 157.245.142.119 | attackbots | 02/19/2020-14:32:46.984255 157.245.142.119 Protocol: 6 ET POLICY Cleartext WordPress Login  | 
                    2020-02-20 03:44:36 | 
| 182.72.104.106 | attackspambots | Feb 19 18:04:21 *** sshd[13474]: Invalid user rstudio-server from 182.72.104.106  | 
                    2020-02-20 03:24:16 | 
| 192.42.116.16 | attackbots | 02/19/2020-19:15:17.641613 192.42.116.16 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 39  | 
                    2020-02-20 03:35:46 | 
| 89.109.34.173 | attackbots | Honeypot attack, port: 445, PTR: 89-109-34-173.static.mts-nn.ru.  | 
                    2020-02-20 03:32:16 | 
| 88.250.210.72 | attackbots | Honeypot attack, port: 81, PTR: 88.250.210.72.static.ttnet.com.tr.  | 
                    2020-02-20 03:04:01 | 
| 72.204.229.55 | attack | tcp 4567  | 
                    2020-02-20 03:11:24 | 
| 14.191.245.94 | attack | Unauthorized connection attempt from IP address 14.191.245.94 on Port 445(SMB)  | 
                    2020-02-20 03:11:52 | 
| 2.180.47.231 | attackspam | Honeypot attack, port: 5555, PTR: PTR record not found  | 
                    2020-02-20 03:37:50 | 
| 125.214.56.123 | attackbots | Automatic report - Port Scan Attack  | 
                    2020-02-20 03:28:00 | 
| 192.241.128.214 | attackspambots | Invalid user HTTP from 192.241.128.214 port 45736  | 
                    2020-02-20 03:26:10 |