City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.78.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26309
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.226.78.82. IN A
;; AUTHORITY SECTION:
. 168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022061200 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 13 01:16:57 CST 2022
;; MSG SIZE rcvd: 106
82.78.226.137.in-addr.arpa domain name pointer test.nanni.embedded.rwth-aachen.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
82.78.226.137.in-addr.arpa name = test.nanni.embedded.rwth-aachen.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.158.124.108 | attack | Invalid user shl from 51.158.124.108 port 37842 |
2019-08-24 13:05:55 |
| 52.0.193.119 | attackbotsspam | Port Scan: TCP/445 |
2019-08-24 13:41:09 |
| 188.16.149.86 | attack | Port Scan: TCP/23 |
2019-08-24 12:48:09 |
| 171.15.186.118 | attack | Port Scan: TCP/8080 |
2019-08-24 12:52:20 |
| 62.56.255.132 | attack | Port Scan: TCP/23 |
2019-08-24 13:05:33 |
| 181.64.12.20 | attackspam | Port Scan: TCP/23 |
2019-08-24 12:50:07 |
| 192.150.253.126 | attackspam | Port Scan: UDP/137 |
2019-08-24 13:19:42 |
| 87.109.217.133 | attack | Port Scan: TCP/23 |
2019-08-24 13:00:59 |
| 72.22.12.62 | attack | Port Scan: UDP/500 |
2019-08-24 13:02:15 |
| 109.123.117.251 | attackbots | Port Scan: TCP/4567 |
2019-08-24 12:57:16 |
| 179.179.228.247 | attackbots | Port Scan: UDP/137 |
2019-08-24 13:21:42 |
| 5.206.224.194 | attack | Port Scan: TCP/2323 |
2019-08-24 13:11:51 |
| 88.231.109.224 | attackbots | Port Scan: TCP/60001 |
2019-08-24 12:59:50 |
| 40.137.191.210 | attackspambots | Port Scan: UDP/137 |
2019-08-24 13:07:33 |
| 178.128.212.191 | attackbots | Port Scan: TCP/10000 |
2019-08-24 13:22:10 |