City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.53.248.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;135.53.248.213. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 14:47:19 CST 2025
;; MSG SIZE rcvd: 107
Host 213.248.53.135.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 213.248.53.135.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
92.118.37.99 | attackbotsspam | Port 43120 scan denied |
2020-04-17 07:02:18 |
45.224.105.80 | attack | Sql/code injection probe |
2020-04-17 07:18:02 |
185.175.93.104 | attack | 04/16/2020-18:32:14.522721 185.175.93.104 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-04-17 06:54:34 |
92.63.196.6 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 88 - port: 6353 proto: TCP cat: Misc Attack |
2020-04-17 07:03:10 |
104.140.188.22 | attackbots | Port 3389 (MS RDP) access denied |
2020-04-17 07:00:15 |
80.82.78.100 | attackspam | Multiport scan : 13 ports scanned 998 1023 1027 1030 1045 1051 1055 1060 1067 1088 1541 1646 2123 |
2020-04-17 07:07:07 |
203.177.163.90 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-17 06:52:57 |
45.88.104.99 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 27 - port: 7420 proto: TCP cat: Misc Attack |
2020-04-17 07:16:00 |
116.196.124.159 | attack | Apr 16 17:03:40 ny01 sshd[9141]: Failed password for root from 116.196.124.159 port 54534 ssh2 Apr 16 17:07:08 ny01 sshd[9698]: Failed password for root from 116.196.124.159 port 54804 ssh2 |
2020-04-17 07:20:35 |
3.210.181.204 | attackbotsspam | ET INFO Possible COVID-19 Domain in SSL Certificate M2 - port: 8773 proto: TCP cat: Potentially Bad Traffic |
2020-04-17 06:50:51 |
106.13.78.120 | attackspam | Apr 16 20:34:01 *** sshd[6808]: Invalid user jl from 106.13.78.120 |
2020-04-17 07:20:54 |
1.227.37.35 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 1 - port: 23 proto: TCP cat: Misc Attack |
2020-04-17 06:51:22 |
222.186.175.183 | attackspam | Apr 16 19:20:40 NPSTNNYC01T sshd[7241]: Failed password for root from 222.186.175.183 port 10956 ssh2 Apr 16 19:20:43 NPSTNNYC01T sshd[7241]: Failed password for root from 222.186.175.183 port 10956 ssh2 Apr 16 19:20:46 NPSTNNYC01T sshd[7241]: Failed password for root from 222.186.175.183 port 10956 ssh2 Apr 16 19:20:53 NPSTNNYC01T sshd[7241]: error: maximum authentication attempts exceeded for root from 222.186.175.183 port 10956 ssh2 [preauth] ... |
2020-04-17 07:24:20 |
66.232.63.37 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 55 - port: 8089 proto: TCP cat: Misc Attack |
2020-04-17 07:10:23 |
27.68.32.70 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 12 - port: 9530 proto: TCP cat: Misc Attack |
2020-04-17 07:17:01 |