City: unknown
Region: unknown
Country: Korea Republic of
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.1.99.31
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61665
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;124.1.99.31. IN A
;; AUTHORITY SECTION:
. 180 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 15:17:00 CST 2022
;; MSG SIZE rcvd: 104
Host 31.99.1.124.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 31.99.1.124.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 196.52.43.86 | attack | Honeypot hit. |
2019-06-21 13:57:41 |
| 37.49.225.178 | attackbots | Fri 21 00:02:37 389/udp |
2019-06-21 14:14:58 |
| 160.16.213.206 | attackspambots | Jun 20 10:43:56 mxgate1 postfix/postscreen[13076]: CONNECT from [160.16.213.206]:37536 to [176.31.12.44]:25 Jun 20 10:43:56 mxgate1 postfix/dnsblog[13081]: addr 160.16.213.206 listed by domain b.barracudacentral.org as 127.0.0.2 Jun 20 10:44:02 mxgate1 postfix/postscreen[13076]: PASS NEW [160.16.213.206]:37536 Jun 20 10:44:04 mxgate1 postfix/smtpd[13281]: connect from tk2-248-33952.vs.sakura.ne.jp[160.16.213.206] Jun x@x Jun 20 10:44:08 mxgate1 postfix/smtpd[13281]: disconnect from tk2-248-33952.vs.sakura.ne.jp[160.16.213.206] ehlo=2 starttls=1 mail=1 rcpt=0/1 data=0/1 eclipset=1 quhostname=1 commands=6/8 Jun 20 12:11:28 mxgate1 postfix/postscreen[16144]: CONNECT from [160.16.213.206]:49892 to [176.31.12.44]:25 Jun 20 12:11:28 mxgate1 postfix/dnsblog[16223]: addr 160.16.213.206 listed by domain b.barracudacentral.org as 127.0.0.2 Jun 20 12:11:28 mxgate1 postfix/postscreen[16144]: PASS OLD [160.16.213.206]:49892 Jun 20 12:11:29 mxgate1 postfix/smtpd[16250]: connect from ........ ------------------------------- |
2019-06-21 14:15:58 |
| 74.82.47.16 | attack | 548/tcp 4786/tcp 8080/tcp... [2019-04-24/06-21]40pkt,11pt.(tcp),1pt.(udp) |
2019-06-21 13:55:34 |
| 139.199.106.127 | attackbotsspam | 20 attempts against mh-ssh on pluto.magehost.pro |
2019-06-21 14:03:57 |
| 209.17.97.50 | attackspam | IP: 209.17.97.50 ASN: AS174 Cogent Communications Port: World Wide Web HTTP 80 Found in one or more Blacklists Date: 21/06/2019 4:50:40 AM UTC |
2019-06-21 13:53:15 |
| 49.147.104.102 | attack | 445/tcp [2019-06-21]1pkt |
2019-06-21 14:25:27 |
| 119.196.244.140 | attack | Unauthorised access (Jun 21) SRC=119.196.244.140 LEN=40 TTL=52 ID=9001 TCP DPT=8080 WINDOW=63929 SYN Unauthorised access (Jun 19) SRC=119.196.244.140 LEN=40 TTL=52 ID=685 TCP DPT=8080 WINDOW=63929 SYN Unauthorised access (Jun 18) SRC=119.196.244.140 LEN=40 TTL=52 ID=15538 TCP DPT=8080 WINDOW=63929 SYN Unauthorised access (Jun 17) SRC=119.196.244.140 LEN=40 TTL=52 ID=33171 TCP DPT=8080 WINDOW=63929 SYN Unauthorised access (Jun 17) SRC=119.196.244.140 LEN=40 TTL=52 ID=38537 TCP DPT=8080 WINDOW=58462 SYN |
2019-06-21 14:03:36 |
| 185.244.25.151 | attack | 81/tcp 37215/tcp 8083/tcp... [2019-05-12/06-21]1278pkt,3pt.(tcp) |
2019-06-21 13:46:54 |
| 141.98.81.37 | attackbotsspam | Invalid user admin from 141.98.81.37 port 11805 |
2019-06-21 14:18:58 |
| 178.128.105.195 | attackbotsspam | xmlrpc attack |
2019-06-21 14:09:32 |
| 219.147.15.232 | attackbotsspam | Unauthorised access (Jun 21) SRC=219.147.15.232 LEN=52 TTL=48 ID=5331 DF TCP DPT=445 WINDOW=8192 SYN |
2019-06-21 13:48:07 |
| 124.158.124.223 | attack | 23/tcp [2019-06-21]1pkt |
2019-06-21 14:04:23 |
| 150.129.121.68 | attackspam | Unauthorised access (Jun 21) SRC=150.129.121.68 LEN=52 TTL=113 ID=13632 DF TCP DPT=445 WINDOW=8192 SYN |
2019-06-21 13:46:30 |
| 47.52.11.43 | attack | xmlrpc attack |
2019-06-21 13:36:44 |