City: unknown
Region: unknown
Country: United Kingdom of Great Britain and Northern Ireland (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.222.80.17
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.222.80.17. IN A
;; AUTHORITY SECTION:
. 366 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023032900 1800 900 604800 86400
;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 29 18:54:34 CST 2023
;; MSG SIZE rcvd: 106
17.80.222.139.in-addr.arpa domain name pointer macbook-w.mth.uea.ac.uk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
17.80.222.139.in-addr.arpa name = macbook-w.mth.uea.ac.uk.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
113.70.56.17 | attackspambots | Unauthorized connection attempt detected from IP address 113.70.56.17 to port 23 [T] |
2020-03-24 22:31:27 |
112.90.197.66 | attackbotsspam | Mar 24 14:21:34 debian-2gb-nbg1-2 kernel: \[7315178.268401\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=112.90.197.66 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=234 ID=22676 PROTO=TCP SPT=50806 DPT=6379 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-24 22:33:43 |
96.48.158.15 | attack | Honeypot attack, port: 445, PTR: S0106c05627353772.vs.shawcable.net. |
2020-03-24 21:50:06 |
1.55.109.84 | attack | Unauthorized connection attempt detected from IP address 1.55.109.84 to port 445 [T] |
2020-03-24 21:59:19 |
27.2.122.76 | attackspambots | Unauthorized connection attempt detected from IP address 27.2.122.76 to port 23 [T] |
2020-03-24 21:58:56 |
183.89.84.7 | attackspam | Unauthorized connection attempt detected from IP address 183.89.84.7 to port 5555 [T] |
2020-03-24 22:11:58 |
180.105.39.215 | attack | Unauthorized connection attempt detected from IP address 180.105.39.215 to port 26 [T] |
2020-03-24 22:16:13 |
176.62.84.110 | attack | Unauthorized connection attempt from IP address 176.62.84.110 on Port 445(SMB) |
2020-03-24 22:17:20 |
59.63.205.117 | attackspam | Unauthorized connection attempt detected from IP address 59.63.205.117 to port 445 [T] |
2020-03-24 21:53:37 |
46.101.40.21 | attackbotsspam | 2020-03-24T15:13:16.185599ns386461 sshd\[14947\]: Invalid user skin from 46.101.40.21 port 42782 2020-03-24T15:13:16.189935ns386461 sshd\[14947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21 2020-03-24T15:13:18.346551ns386461 sshd\[14947\]: Failed password for invalid user skin from 46.101.40.21 port 42782 ssh2 2020-03-24T15:32:11.773452ns386461 sshd\[32054\]: Invalid user cgi-bin from 46.101.40.21 port 41746 2020-03-24T15:32:11.777862ns386461 sshd\[32054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.40.21 ... |
2020-03-24 22:43:43 |
92.63.194.30 | attackspam | Unauthorized connection attempt detected from IP address 92.63.194.30 to port 8453 [T] |
2020-03-24 22:36:42 |
111.32.171.44 | attack | fail2ban ban IP |
2020-03-24 21:45:50 |
86.91.191.103 | attack | Exploit Attempt |
2020-03-24 21:52:24 |
42.82.111.17 | attackspambots | Unauthorized connection attempt detected from IP address 42.82.111.17 to port 81 [T] |
2020-03-24 21:56:48 |
113.26.179.207 | attackspambots | Unauthorized connection attempt detected from IP address 113.26.179.207 to port 23 [T] |
2020-03-24 22:31:51 |