City: unknown
Region: unknown
Country: Sweden
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.14.29.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19555
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.14.29.153. IN A
;; AUTHORITY SECTION:
. 172 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400
;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 09:39:04 CST 2023
;; MSG SIZE rcvd: 106
b'Host 153.29.14.138.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 138.14.29.153.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
62.210.136.166 | attack | Feb 26 16:43:59 debian-2gb-nbg1-2 kernel: \[4991035.463375\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=62.210.136.166 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=29678 PROTO=TCP SPT=47429 DPT=22024 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-02-27 01:02:07 |
185.175.93.101 | attack | ET DROP Dshield Block Listed Source group 1 - port: 5907 proto: TCP cat: Misc Attack |
2020-02-27 01:09:15 |
218.92.0.148 | attack | Feb 26 17:50:58 jane sshd[7099]: Failed password for root from 218.92.0.148 port 32870 ssh2 Feb 26 17:51:03 jane sshd[7099]: Failed password for root from 218.92.0.148 port 32870 ssh2 ... |
2020-02-27 01:04:01 |
58.225.75.147 | attackspam | Feb 26 17:52:30 debian-2gb-nbg1-2 kernel: \[4995146.033464\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=58.225.75.147 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=36734 PROTO=TCP SPT=32767 DPT=18082 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-02-27 01:30:15 |
172.105.210.107 | attackbotsspam | scans 1 times in preceeding hours on the ports (in chronological order) 8009 resulting in total of 6 scans from 172.104.0.0/15 block. |
2020-02-27 01:14:17 |
89.248.168.202 | attackspam | Feb 26 18:08:33 debian-2gb-nbg1-2 kernel: \[4996108.916441\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.168.202 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=32637 PROTO=TCP SPT=53577 DPT=6213 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-02-27 01:24:05 |
185.175.93.78 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 38366 proto: TCP cat: Misc Attack |
2020-02-27 01:09:44 |
211.24.110.125 | attackbots | $f2bV_matches |
2020-02-27 01:04:48 |
51.83.78.82 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 37 - port: 8545 proto: TCP cat: Misc Attack |
2020-02-27 01:33:02 |
185.175.93.3 | attack | ET DROP Dshield Block Listed Source group 1 - port: 6564 proto: TCP cat: Misc Attack |
2020-02-27 01:11:17 |
80.82.77.245 | attackbots | 26.02.2020 17:07:44 Connection to port 1064 blocked by firewall |
2020-02-27 01:28:14 |
45.227.254.30 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 30 - port: 35444 proto: TCP cat: Misc Attack |
2020-02-27 01:33:19 |
51.91.212.80 | attackspambots | 02/26/2020-18:23:05.772922 51.91.212.80 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 53 |
2020-02-27 01:32:17 |
89.248.168.51 | attackspambots | Port 3000 scan denied |
2020-02-27 01:25:01 |
213.217.0.5 | attackspambots | scans 12 times in preceeding hours on the ports (in chronological order) 39087 39178 39412 39082 39400 39004 39479 39369 39452 39415 39050 39374 resulting in total of 31 scans from 213.217.0.0/23 block. |
2020-02-27 01:37:01 |