City: Frankfurt am Main
Region: Hesse
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.131.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62858
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.162.131.74.			IN	A
;; AUTHORITY SECTION:
.			387	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:06:33 CST 2022
;; MSG SIZE  rcvd: 10774.131.162.139.in-addr.arpa domain name pointer li1397-74.members.linode.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
74.131.162.139.in-addr.arpa	name = li1397-74.members.linode.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 192.241.228.161 | attackspambots | 8008/tcp 3011/tcp 5432/tcp... [2020-06-24/07-06]12pkt,12pt.(tcp) | 2020-07-07 00:28:22 | 
| 89.248.168.217 | attackspam | scans 3 times in preceeding hours on the ports (in chronological order) 1028 1028 1031 resulting in total of 42 scans from 89.248.160.0-89.248.174.255 block. | 2020-07-07 00:18:19 | 
| 80.82.77.33 | attackbots | 07/06/2020-10:43:07.261980 80.82.77.33 Protocol: 6 ET DROP Dshield Block Listed Source group 1 | 2020-07-07 00:20:35 | 
| 94.102.49.114 | attackspam | firewall-block, port(s): 5048/tcp, 8228/tcp, 8310/tcp, 8401/tcp, 51630/tcp, 52003/tcp | 2020-07-06 23:59:05 | 
| 64.225.70.13 | attack | Jul 6 16:37:35 xeon sshd[55928]: Failed password for invalid user leticia from 64.225.70.13 port 37452 ssh2 | 2020-07-07 00:23:35 | 
| 192.241.223.237 | attack | Port scan: Attack repeated for 24 hours | 2020-07-07 00:38:45 | 
| 192.241.227.97 | attackspam | Port Scan detected! ... | 2020-07-07 00:32:20 | 
| 192.241.245.248 | attackbots | " " | 2020-07-07 00:25:19 | 
| 104.248.155.233 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 3026 resulting in total of 6 scans from 104.248.0.0/16 block. | 2020-07-07 00:13:03 | 
| 192.241.225.108 | attackspam | scans once in preceeding hours on the ports (in chronological order) 9200 resulting in total of 70 scans from 192.241.128.0/17 block. | 2020-07-07 00:36:22 | 
| 192.241.225.55 | attackbotsspam | Hit honeypot r. | 2020-07-07 00:36:56 | 
| 185.176.27.210 | attack | firewall-block, port(s): 3416/tcp, 3453/tcp, 3472/tcp, 3485/tcp | 2020-07-07 00:04:17 | 
| 206.189.92.162 | attack | Fail2Ban Ban Triggered | 2020-07-07 00:02:46 | 
| 104.248.90.77 | attackbots | 
 | 2020-07-07 00:15:06 | 
| 206.189.126.247 | attack | 9002/tcp 19756/tcp 9891/tcp... [2020-06-22/07-06]26pkt,9pt.(tcp) | 2020-07-07 00:02:17 |