City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.14.5.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38952
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;136.14.5.146. IN A
;; AUTHORITY SECTION:
. 110 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022012700 1800 900 604800 86400
;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 27 17:08:26 CST 2022
;; MSG SIZE rcvd: 105
Host 146.5.14.136.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 146.5.14.136.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
202.164.208.19 | attackspam | Listed on abuseat.org plus zen-spamhaus / proto=6 . srcport=58885 . dstport=445 SMB . (3545) |
2020-10-05 23:01:35 |
222.169.117.250 | attackspambots | Found on CINS badguys / proto=6 . srcport=42876 . dstport=1433 . (3542) |
2020-10-05 23:23:10 |
220.158.162.143 | attack | 445/tcp 445/tcp 445/tcp [2020-10-04]3pkt |
2020-10-05 23:01:23 |
198.23.236.113 | attack | Port 22 Scan, PTR: None |
2020-10-05 23:08:00 |
5.124.28.234 | attackbots | 445/tcp [2020-10-04]1pkt |
2020-10-05 23:21:15 |
151.236.33.74 | attackbots | SSH Scan |
2020-10-05 23:09:13 |
203.195.175.47 | attack | Fail2Ban Ban Triggered (2) |
2020-10-05 22:53:44 |
35.142.163.228 | attack | 22/tcp 22/tcp [2020-10-04]2pkt |
2020-10-05 22:44:30 |
124.193.142.2 | attack | sshd: Failed password for .... from 124.193.142.2 port 43194 ssh2 (2 attempts) |
2020-10-05 23:15:57 |
114.40.49.6 | attackbotsspam | 445/tcp [2020-10-04]1pkt |
2020-10-05 23:17:22 |
140.143.228.67 | attackbotsspam | Oct 5 03:40:47 [host] sshd[5717]: pam_unix(sshd:a Oct 5 03:40:49 [host] sshd[5717]: Failed password Oct 5 03:44:40 [host] sshd[5853]: pam_unix(sshd:a |
2020-10-05 23:15:32 |
41.65.186.232 | attackbotsspam | 445/tcp 445/tcp [2020-10-04]2pkt |
2020-10-05 22:55:23 |
154.126.36.108 | attackspambots | SMB Server BruteForce Attack |
2020-10-05 22:44:13 |
2.87.11.177 | attackspam | honeypot 22 port |
2020-10-05 23:22:43 |
103.99.188.168 | attackspambots | Automatic report - Port Scan Attack |
2020-10-05 23:17:51 |