City: Canberra
Region: Australian Capital Territory
Country: Australia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.168.136.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32437
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.168.136.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011001 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 11 10:07:58 CST 2025
;; MSG SIZE rcvd: 108
242.136.168.139.in-addr.arpa domain name pointer cpe-139-168-136-242.ab02.act.asp.telstra.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
242.136.168.139.in-addr.arpa name = cpe-139-168-136-242.ab02.act.asp.telstra.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
106.54.140.250 | attackspam | 5x Failed Password |
2020-06-05 02:52:04 |
193.169.212.42 | attack | SpamScore above: 10.0 |
2020-06-05 03:01:45 |
14.231.215.45 | attackspam | Unauthorized connection attempt from IP address 14.231.215.45 on Port 445(SMB) |
2020-06-05 02:58:04 |
200.90.108.170 | attackbotsspam | Brute forcing RDP port 3389 |
2020-06-05 02:46:23 |
138.204.74.42 | attack | Icarus honeypot on github |
2020-06-05 03:02:42 |
193.112.127.245 | attackbots | 5x Failed Password |
2020-06-05 02:56:55 |
62.183.45.90 | attackspam | Unauthorized connection attempt from IP address 62.183.45.90 on Port 445(SMB) |
2020-06-05 03:00:08 |
188.254.0.112 | attackbots | SSH/22 MH Probe, BF, Hack - |
2020-06-05 02:39:32 |
185.172.110.227 | attackspam | ZTE Router Exploit Scanner |
2020-06-05 02:46:42 |
193.169.212.203 | attackbots | SpamScore above: 10.0 |
2020-06-05 02:56:22 |
198.46.189.106 | attackspambots | Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF) |
2020-06-05 02:41:14 |
93.63.84.182 | attackbots | Unauthorized connection attempt from IP address 93.63.84.182 on Port 445(SMB) |
2020-06-05 02:48:32 |
94.199.181.251 | attackbotsspam | C1,WP GET /wp-login.php GET /wp-login.php |
2020-06-05 02:44:11 |
217.112.142.65 | attackspambots | Jun 4 13:58:30 mail.srvfarm.net postfix/smtpd[2502820]: NOQUEUE: reject: RCPT from unknown[217.112.142.65]: 450 4.1.8 |
2020-06-05 03:16:54 |
116.100.250.221 | attackbotsspam | Automatic report - Port Scan Attack |
2020-06-05 03:04:13 |