City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.27.200.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48686
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;129.27.200.38. IN A
;; AUTHORITY SECTION:
. 445 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 09:05:01 CST 2022
;; MSG SIZE rcvd: 106
38.200.27.129.in-addr.arpa domain name pointer uxdaygraz2017.isds.tugraz.at.
38.200.27.129.in-addr.arpa domain name pointer uxgraz.isds.tugraz.at.
38.200.27.129.in-addr.arpa domain name pointer uxdaygraz2015.isds.tugraz.at.
38.200.27.129.in-addr.arpa domain name pointer uxdaygraz2013.isds.tugraz.at.
38.200.27.129.in-addr.arpa domain name pointer cdn.isds.tugraz.at.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
38.200.27.129.in-addr.arpa name = uxdaygraz2017.isds.tugraz.at.
38.200.27.129.in-addr.arpa name = uxgraz.isds.tugraz.at.
38.200.27.129.in-addr.arpa name = uxdaygraz2015.isds.tugraz.at.
38.200.27.129.in-addr.arpa name = uxdaygraz2013.isds.tugraz.at.
38.200.27.129.in-addr.arpa name = cdn.isds.tugraz.at.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
213.6.78.118 | attackbots | 445/tcp 1433/tcp... [2020-03-04/04-13]4pkt,2pt.(tcp) |
2020-04-14 00:04:54 |
167.172.158.180 | attackbotsspam | firewall-block, port(s): 25084/tcp |
2020-04-14 00:09:02 |
154.123.217.255 | attack | 1586767228 - 04/13/2020 10:40:28 Host: 154.123.217.255/154.123.217.255 Port: 445 TCP Blocked |
2020-04-14 00:00:18 |
46.101.164.47 | attack | sshd jail - ssh hack attempt |
2020-04-14 00:18:53 |
115.236.232.243 | attackspambots | port scan and connect, tcp 23 (telnet) |
2020-04-14 00:21:00 |
99.159.106.162 | attack | Unauthorized connection attempt detected from IP address 99.159.106.162 to port 23 |
2020-04-14 00:11:29 |
104.248.187.165 | attackbotsspam | Apr 13 17:53:25 minden010 sshd[14589]: Failed password for nobody from 104.248.187.165 port 40244 ssh2 Apr 13 17:57:03 minden010 sshd[16408]: Failed password for root from 104.248.187.165 port 34458 ssh2 ... |
2020-04-14 00:23:47 |
167.71.240.75 | attack | DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks UA removed |
2020-04-14 00:01:55 |
51.91.136.174 | attackbotsspam | Unauthorized connection attempt detected from IP address 51.91.136.174 to port 10022 |
2020-04-14 00:25:59 |
158.69.63.54 | attackbotsspam | firewall-block, port(s): 8888/tcp |
2020-04-14 00:15:48 |
110.15.16.160 | attackbotsspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-04-14 00:17:06 |
167.114.89.207 | attack | firewall-block, port(s): 8888/tcp |
2020-04-14 00:10:51 |
159.203.160.221 | attackspambots | 04/13/2020-11:03:28.879775 159.203.160.221 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-04-14 00:14:29 |
178.72.130.253 | attackbots | Unauthorized connection attempt detected from IP address 178.72.130.253 to port 23 |
2020-04-14 00:07:12 |
144.22.108.33 | attack | Bruteforce detected by fail2ban |
2020-04-14 00:25:06 |