City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.210.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.226.210.14.			IN	A
;; AUTHORITY SECTION:
.			215	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061300 1800 900 604800 86400
;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 21:08:55 CST 2022
;; MSG SIZE  rcvd: 10714.210.226.137.in-addr.arpa domain name pointer fb2-a-014.arch.rwth-aachen.de.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
14.210.226.137.in-addr.arpa	name = fb2-a-014.arch.rwth-aachen.de.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 185.175.93.104 | attack | Fail2Ban Ban Triggered | 2020-03-25 20:21:11 | 
| 160.120.165.107 | attackbotsspam | Unauthorized connection attempt detected from IP address 160.120.165.107 to port 1433 | 2020-03-25 19:50:31 | 
| 125.212.217.214 | attack | firewall-block, port(s): 1022/tcp | 2020-03-25 19:53:06 | 
| 184.106.81.166 | attackbots | SIPVicious Scanner Detection | 2020-03-25 20:24:00 | 
| 185.202.1.34 | attackbots | " " | 2020-03-25 19:31:51 | 
| 198.108.67.63 | attackbots | Mar 25 09:22:59 debian-2gb-nbg1-2 kernel: \[7383659.994191\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.67.63 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=32 ID=4961 PROTO=TCP SPT=53770 DPT=49971 WINDOW=1024 RES=0x00 SYN URGP=0 | 2020-03-25 20:08:47 | 
| 89.248.168.220 | attackspam | Port 4063 scan denied | 2020-03-25 19:56:20 | 
| 185.200.118.42 | attackspambots | Port 1723 scan denied | 2020-03-25 19:32:30 | 
| 162.243.130.155 | attackbots | Mar 25 10:47:47 IngegnereFirenze sshd[10160]: Did not receive identification string from 162.243.130.155 port 39498 ... | 2020-03-25 19:44:38 | 
| 176.113.70.60 | attackspam | 176.113.70.60 was recorded 5 times by 2 hosts attempting to connect to the following ports: 1900. Incident counter (4h, 24h, all-time): 5, 39, 4531 | 2020-03-25 20:25:37 | 
| 162.243.132.148 | attackbots | firewall-block, port(s): 109/tcp | 2020-03-25 19:41:43 | 
| 192.241.237.68 | attack | SSH-bruteforce attempts | 2020-03-25 19:29:32 | 
| 139.219.6.50 | attackbots | Unauthorized connection attempt detected from IP address 139.219.6.50 to port 8251 [T] | 2020-03-25 19:51:52 | 
| 146.88.240.128 | attack | Mar 25 11:55:00 debian-2gb-nbg1-2 kernel: \[7392781.001257\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=146.88.240.128 DST=195.201.40.59 LEN=28 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=UDP SPT=56838 DPT=37862 LEN=8 | 2020-03-25 19:51:19 | 
| 172.105.89.161 | attack | Unauthorized connection attempt detected from IP address 172.105.89.161 to port 389 [T] | 2020-03-25 20:25:52 |