City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.228.90.186
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26427
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.228.90.186. IN A
;; AUTHORITY SECTION:
. 525 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:28:20 CST 2022
;; MSG SIZE rcvd: 107
186.90.228.139.in-addr.arpa domain name pointer fm-dyn-139-228-90-186.fast.net.id.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
186.90.228.139.in-addr.arpa name = fm-dyn-139-228-90-186.fast.net.id.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 195.54.161.28 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 5000 proto: TCP cat: Misc Attack |
2020-06-06 08:53:50 |
| 141.98.81.138 | attack |
|
2020-06-06 09:00:59 |
| 219.84.201.39 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-06-06 08:50:28 |
| 69.175.97.173 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 67 - port: 3001 proto: TCP cat: Misc Attack |
2020-06-06 08:40:58 |
| 80.82.64.219 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 75 - port: 3389 proto: TCP cat: Misc Attack |
2020-06-06 09:11:17 |
| 92.53.65.40 | attackbots | 06/05/2020-18:49:57.178707 92.53.65.40 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-06-06 09:07:56 |
| 103.234.21.3 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 100 - port: 1433 proto: TCP cat: Misc Attack |
2020-06-06 09:03:35 |
| 185.173.35.1 | attack | firewall-block, port(s): 143/tcp |
2020-06-06 08:58:15 |
| 181.143.31.42 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-06-06 09:00:41 |
| 58.211.144.220 | attack | Unauthorized connection attempt detected from IP address 58.211.144.220 to port 2410 |
2020-06-06 09:14:54 |
| 92.63.194.104 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 90 - port: 1723 proto: TCP cat: Misc Attack |
2020-06-06 09:07:37 |
| 66.240.205.34 | attackbots | Unauthorized connection attempt detected from IP address 66.240.205.34 to port 1800 |
2020-06-06 08:41:13 |
| 58.228.159.253 | attack | Unauthorized connection attempt from IP address 58.228.159.253 on Port 3389(RDP) |
2020-06-06 08:43:06 |
| 51.161.12.231 | attackbots | Jun 6 03:59:31 debian kernel: [307732.327945] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=51.161.12.231 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=63342 PROTO=TCP SPT=32767 DPT=8545 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-06 09:16:00 |
| 94.102.51.17 | attackbots | Scanned 237 unique addresses for 289 unique ports in 24 hours |
2020-06-06 09:06:11 |