City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.211.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51722
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.226.211.159.		IN	A
;; AUTHORITY SECTION:
.			210	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061300 1800 900 604800 86400
;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 21:08:44 CST 2022
;; MSG SIZE  rcvd: 108159.211.226.137.in-addr.arpa domain name pointer fb2-b-159.arch.rwth-aachen.de.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
159.211.226.137.in-addr.arpa	name = fb2-b-159.arch.rwth-aachen.de.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 185.176.27.254 | attackspam | 01/31/2020-09:57:15.085168 185.176.27.254 Protocol: 6 ET DROP Dshield Block Listed Source group 1 | 2020-01-31 23:00:57 | 
| 174.138.40.214 | attackbots | xmlrpc attack | 2020-01-31 23:04:29 | 
| 222.186.175.169 | attack | Jan 31 15:21:09 ns381471 sshd[12920]: Failed password for root from 222.186.175.169 port 9990 ssh2 Jan 31 15:21:22 ns381471 sshd[12920]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 9990 ssh2 [preauth] | 2020-01-31 22:30:03 | 
| 106.13.124.189 | attack | Unauthorized connection attempt detected from IP address 106.13.124.189 to port 2220 [J] | 2020-01-31 22:32:47 | 
| 219.140.119.44 | attackspambots | 219.140.119.44 - - \[31/Jan/2020:10:43:47 +0200\] "GET http://www.rfa.org/english/ HTTP/1.1" 404 206 "-" "Mozilla/5.0 \(Windows NT 10.0\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/45.0.2454.101 Safari/537.36" | 2020-01-31 22:39:59 | 
| 221.13.12.118 | attackbots | Unauthorized connection attempt detected from IP address 221.13.12.118 to port 443 [J] | 2020-01-31 22:42:35 | 
| 54.39.138.251 | attackspambots | Invalid user kuldeep from 54.39.138.251 port 42354 | 2020-01-31 23:02:34 | 
| 156.96.62.87 | attack | IP: 156.96.62.87
Ports affected
    Simple Mail Transfer (25) 
Abuse Confidence rating 51%
Found in DNSBL('s)
ASN Details
   AS46664 VolumeDrive
   United States (US)
   CIDR 156.96.56.0/21
Log Date: 31/01/2020 10:20:25 AM UTC | 2020-01-31 22:49:17 | 
| 34.74.244.200 | attack | REQUESTED PAGE: /xmlrpc.php?rsd | 2020-01-31 22:56:07 | 
| 78.139.38.195 | attackspambots | Automatic report - Port Scan Attack | 2020-01-31 22:41:07 | 
| 90.154.71.179 | attackspam | TCP Port Scanning | 2020-01-31 23:03:15 | 
| 123.179.15.193 | attack | 123.179.15.193 - - \[31/Jan/2020:10:43:45 +0200\] "CONNECT www.voanews.com:443 HTTP/1.1" 403 202 "-" "PycURL/7.43.0 libcurl/7.47.0 GnuTLS/3.4.10 zlib/1.2.8 libidn/1.32 librtmp/2.3" | 2020-01-31 22:41:44 | 
| 80.82.77.33 | attackbots | port scan and connect, tcp 8080 (http-proxy) | 2020-01-31 22:48:35 | 
| 103.16.27.81 | attackspambots | TCP Port Scanning | 2020-01-31 22:47:47 | 
| 122.60.184.195 | attack | TCP Port Scanning | 2020-01-31 22:28:38 |