City: Baltimore
Region: Maryland
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.192.232.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14309
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.192.232.5. IN A
;; AUTHORITY SECTION:
. 329 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023010100 1800 900 604800 86400
;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 01 14:38:14 CST 2023
;; MSG SIZE rcvd: 106
b'Host 5.232.192.134.in-addr.arpa not found: 2(SERVFAIL)
'
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 5.232.192.134.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
185.109.74.127 | attackspambots | UTC: 2019-10-21 port: 81/tcp |
2019-10-22 18:16:53 |
158.140.111.134 | attack | Brute force attempt |
2019-10-22 18:23:53 |
104.244.77.210 | attackspambots | Invalid user fake from 104.244.77.210 port 37640 |
2019-10-22 18:25:04 |
218.92.0.192 | attackbotsspam | Oct 22 11:48:38 legacy sshd[22458]: Failed password for root from 218.92.0.192 port 35400 ssh2 Oct 22 11:50:32 legacy sshd[22497]: Failed password for root from 218.92.0.192 port 33840 ssh2 ... |
2019-10-22 18:18:03 |
80.82.77.227 | attackbotsspam | [SMTP/25/465/587 Probe] TLS/SSL handshake failed:[ stream truncated] *(10221211) |
2019-10-22 18:29:30 |
46.101.175.163 | attackbots | Connection by 46.101.175.163 on port: 23 got caught by honeypot at 10/22/2019 3:49:42 AM |
2019-10-22 18:32:19 |
166.62.43.235 | attack | $f2bV_matches |
2019-10-22 18:45:39 |
45.79.152.7 | attackspam | UTC: 2019-10-21 port: 981/tcp |
2019-10-22 18:14:15 |
81.214.70.53 | attack | UTC: 2019-10-21 port: 23/tcp |
2019-10-22 18:19:45 |
178.73.215.171 | attack | [connect count:2 time(s)][SMTP/25/465/587 Probe] in blocklist.de:"listed [mail]" in spfbl.net:"listed" *(10221154) |
2019-10-22 18:30:32 |
190.53.30.218 | attack | Brute force attempt |
2019-10-22 18:45:24 |
54.183.137.158 | attack | $f2bV_matches |
2019-10-22 18:43:09 |
177.68.95.6 | attack | UTC: 2019-10-21 port: 23/tcp |
2019-10-22 18:24:26 |
35.247.58.228 | attack | $f2bV_matches |
2019-10-22 18:41:00 |
159.203.201.144 | attack | UTC: 2019-10-21 port: 22/tcp |
2019-10-22 18:18:25 |