City: Storrs
Region: Connecticut
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.99.58.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11007
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.99.58.180. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 09:36:21 CST 2025
;; MSG SIZE rcvd: 106
180.58.99.137.in-addr.arpa domain name pointer d58h180.public.uconn.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
180.58.99.137.in-addr.arpa name = d58h180.public.uconn.edu.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 83.97.20.31 | attack |
|
2020-09-30 15:46:11 |
| 49.232.148.100 | attackspam | SSH Brute Force |
2020-09-30 16:40:33 |
| 80.82.65.74 | attackbotsspam |
|
2020-09-30 16:35:42 |
| 45.148.122.13 | attackbotsspam | Port scanning [3 denied] |
2020-09-30 15:49:22 |
| 120.194.194.86 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60 |
2020-09-30 15:35:29 |
| 111.40.7.84 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60 |
2020-09-30 16:01:30 |
| 42.240.129.58 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 23 - port: 8291 proto: tcp cat: Misc Attackbytes: 60 |
2020-09-30 16:17:35 |
| 51.79.35.114 | attackbotsspam | Found on CINS badguys / proto=17 . srcport=7777 . dstport=58910 . (166) |
2020-09-30 16:39:09 |
| 104.206.128.38 | attackspambots | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-09-30 16:03:00 |
| 209.198.180.142 | attackspambots | <6 unauthorized SSH connections |
2020-09-30 16:19:47 |
| 49.233.54.98 | attackspambots | Sep 30 04:07:06 vps208890 sshd[112191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.54.98 |
2020-09-30 16:39:54 |
| 103.145.13.179 | attack | firewall-block, port(s): 5060/udp |
2020-09-30 16:31:28 |
| 104.248.131.113 | attack | $f2bV_matches |
2020-09-30 17:01:22 |
| 104.236.55.217 | attackbotsspam | SIP/5060 Probe, BF, Hack - |
2020-09-30 16:02:10 |
| 66.68.187.140 | attackspambots | $f2bV_matches |
2020-09-30 16:38:30 |