City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.74.21.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53927
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.74.21.29. IN A
;; AUTHORITY SECTION:
. 162 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023012200 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 23 00:01:03 CST 2023
;; MSG SIZE rcvd: 105
Host 29.21.74.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 29.21.74.138.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
107.151.148.92 | attackspambots | TCP port 8080: Scan and connection |
2020-04-25 18:59:29 |
51.77.230.49 | attack | SSH invalid-user multiple login attempts |
2020-04-25 18:47:17 |
107.150.74.225 | attack | Registration form abuse |
2020-04-25 19:15:28 |
59.36.172.8 | attack | DATE:2020-04-25 05:48:41, IP:59.36.172.8, PORT:ssh SSH brute force auth (docker-dc) |
2020-04-25 19:16:05 |
94.182.197.202 | attackspambots | php WP PHPmyadamin ABUSE blocked for 12h |
2020-04-25 19:11:20 |
132.232.35.199 | attackbots | (mod_security) mod_security (id:240335) triggered by 132.232.35.199 (CN/China/-): 5 in the last 3600 secs |
2020-04-25 19:07:04 |
138.68.99.46 | attackbots | $f2bV_matches |
2020-04-25 18:48:39 |
54.36.183.126 | attackbots | "GET /test/license.txt HTTP/1.1" 404 3439 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-04-25 19:05:40 |
195.208.30.73 | attackbots | Port probing on unauthorized port 1433 |
2020-04-25 18:46:02 |
51.161.12.231 | attack | Fail2Ban Ban Triggered |
2020-04-25 18:59:48 |
79.118.138.91 | attack | Automatic report - Port Scan Attack |
2020-04-25 18:52:20 |
103.4.94.49 | attackspam | Port probing on unauthorized port 445 |
2020-04-25 18:58:01 |
125.64.98.38 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-25 19:15:12 |
103.40.8.144 | attack | Invalid user gy from 103.40.8.144 port 44414 |
2020-04-25 18:47:51 |
193.151.70.238 | attackspam | IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking. |
2020-04-25 19:10:36 |