City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.214.127.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63604
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.214.127.135. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 19:30:25 CST 2025
;; MSG SIZE rcvd: 108
135.127.214.141.in-addr.arpa domain name pointer host-135.subnet-127.med.umich.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
135.127.214.141.in-addr.arpa name = host-135.subnet-127.med.umich.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
187.177.169.127 | attackbotsspam | Unauthorized connection attempt detected from IP address 187.177.169.127 to port 23 [J] |
2020-01-31 02:50:54 |
49.145.205.9 | attack | Honeypot attack, port: 445, PTR: dsl.49.145.205.9.pldt.net. |
2020-01-31 03:04:00 |
136.232.108.14 | attackbotsspam | Unauthorized connection attempt detected from IP address 136.232.108.14 to port 2323 [T] |
2020-01-31 03:14:16 |
218.92.0.173 | attackbotsspam | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173 user=root Failed password for root from 218.92.0.173 port 44577 ssh2 Failed password for root from 218.92.0.173 port 44577 ssh2 Failed password for root from 218.92.0.173 port 44577 ssh2 Failed password for root from 218.92.0.173 port 44577 ssh2 |
2020-01-31 02:47:15 |
152.238.211.218 | attack | Unauthorized connection attempt detected from IP address 152.238.211.218 to port 8080 [J] |
2020-01-31 02:54:13 |
14.119.106.18 | attack | Unauthorized connection attempt detected from IP address 14.119.106.18 to port 80 [J] |
2020-01-31 02:45:19 |
45.4.244.30 | attackbotsspam | Unauthorized connection attempt detected from IP address 45.4.244.30 to port 1433 [J] |
2020-01-31 02:43:05 |
162.62.26.17 | attack | Unauthorized connection attempt detected from IP address 162.62.26.17 to port 4300 [J] |
2020-01-31 03:11:43 |
14.116.187.31 | attackspambots | Unauthorized connection attempt detected from IP address 14.116.187.31 to port 2220 [J] |
2020-01-31 03:05:23 |
77.42.96.97 | attackspambots | Unauthorized connection attempt detected from IP address 77.42.96.97 to port 23 [J] |
2020-01-31 03:02:13 |
42.117.213.81 | attackbotsspam | Unauthorized connection attempt detected from IP address 42.117.213.81 to port 23 [J] |
2020-01-31 02:43:25 |
83.209.1.83 | attackspam | Unauthorized connection attempt detected from IP address 83.209.1.83 to port 23 [J] |
2020-01-31 02:38:46 |
185.47.161.228 | attack | Unauthorized connection attempt detected from IP address 185.47.161.228 to port 2220 [J] |
2020-01-31 02:52:13 |
106.12.87.250 | attackbots | Unauthorized connection attempt detected from IP address 106.12.87.250 to port 2220 [J] |
2020-01-31 02:59:37 |
190.186.250.174 | attack | Unauthorized connection attempt detected from IP address 190.186.250.174 to port 8080 [J] |
2020-01-31 02:49:31 |