City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.139.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7368
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.226.139.214. IN A
;; AUTHORITY SECTION:
. 344 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022062202 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 05:44:51 CST 2022
;; MSG SIZE rcvd: 108
214.139.226.137.in-addr.arpa domain name pointer c9400-reiff-1-te6-0-1.noc.rwth-aachen.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
214.139.226.137.in-addr.arpa name = c9400-reiff-1-te6-0-1.noc.rwth-aachen.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
185.176.27.166 | attack | slow and persistent scanner |
2019-11-11 02:39:50 |
45.136.109.228 | attackspam | 11/10/2019-12:53:32.079868 45.136.109.228 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 40 |
2019-11-11 02:31:56 |
221.226.28.34 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2019-11-11 02:34:28 |
85.92.152.5 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 79 - port: 1433 proto: TCP cat: Misc Attack |
2019-11-11 02:24:50 |
45.82.153.34 | attack | 11/10/2019-19:49:40.056823 45.82.153.34 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 44 |
2019-11-11 02:58:16 |
83.97.20.46 | attackbots | Port scan: Attack repeated for 24 hours |
2019-11-11 02:25:12 |
185.209.0.32 | attackbots | Portscan or hack attempt detected by psad/fwsnort |
2019-11-11 03:01:01 |
59.144.137.134 | attackbots | 2019-11-10T17:10:48.128997abusebot-2.cloudsearch.cf sshd\[18800\]: Invalid user 123456 from 59.144.137.134 port 35174 |
2019-11-11 02:29:56 |
185.176.27.18 | attackbotsspam | 185.176.27.18 was recorded 146 times by 28 hosts attempting to connect to the following ports: 55390,104,7011,22222,15351,44301,65001,1389,23813,53411,406,58706,7001,42312,9874,3383,8001,53911,50720,37037,13389,33430,48048,33333,5589,18902,65110,23500,20013,31313,50213,11111,16111,50007,4489,9833,3394,33901,41812,33001,30000,2009,60001,3393,56010,8412,10101,33224. Incident counter (4h, 24h, all-time): 146, 770, 4185 |
2019-11-11 03:02:05 |
185.175.93.18 | attackspam | 185.175.93.18 was recorded 83 times by 28 hosts attempting to connect to the following ports: 9833,9104,9201,50004,61301,7102,2600,33885,5402,63390,8004,2908,24701,5202,4589,1807,1889,52340,54104,55588,10501,2401,45200,53000,56551,49606,57180,19407,7001,2008,19000,62223,50101,43389,48553,5004,16204,53535,45000,48620,13501,6006,1818,23401,21200,8989,21100,4000,13605,65001,1401,2501,6689,9901,3351,60002,55601,10003,54085,1002,2001,61901,22000,13389,21001,19900,49898,24401,1018,59914,48247,45001,9001,13204. Incident counter (4h, 24h, all-time): 83, 519, 2381 |
2019-11-11 02:42:54 |
45.136.109.87 | attackspam | Multiport scan : 21 ports scanned 5800 5801 5802 5805 5806 5807 5808 5810 5811 5813 5815 5816 5818 5819 5900 5901 5921 5932 5935 5940 5941 |
2019-11-11 02:32:21 |
77.247.108.119 | attack | firewall-block, port(s): 8808/tcp |
2019-11-11 02:54:11 |
185.176.27.190 | attack | Multiport scan : 7 ports scanned 3391 3393 3395 3396 3397 3398 3399 |
2019-11-11 02:39:34 |
81.22.45.224 | attackspam | 81.22.45.224 was recorded 7 times by 7 hosts attempting to connect to the following ports: 3351,3352,3353. Incident counter (4h, 24h, all-time): 7, 60, 155 |
2019-11-11 02:25:38 |
132.232.94.184 | attackspam | Multiport scan : 8 ports scanned 80 6379 6380 7001 7002 8080 8088 9200 |
2019-11-11 02:45:12 |