City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.195.96.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4369
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;144.195.96.69. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 20:13:47 CST 2025
;; MSG SIZE rcvd: 106
69.96.195.144.in-addr.arpa domain name pointer 144-195-96.zoom.us.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
69.96.195.144.in-addr.arpa name = 144-195-96.zoom.us.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.148.87.62 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-03-20 22:44:03 |
| 64.79.67.70 | attack | Fail2Ban Ban Triggered |
2020-03-20 23:12:53 |
| 218.90.186.138 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-03-20 23:23:38 |
| 80.82.70.118 | attackbots | 03/20/2020-10:09:57.441595 80.82.70.118 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-03-20 23:05:06 |
| 80.82.77.189 | attackspam | Mar 20 16:03:16 debian-2gb-nbg1-2 kernel: \[6975698.032661\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.189 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=58756 PROTO=TCP SPT=52829 DPT=7098 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-20 23:04:18 |
| 112.12.0.146 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-03-20 22:48:26 |
| 185.176.27.94 | attackbots | firewall-block, port(s): 3393/tcp, 3398/tcp |
2020-03-20 23:31:29 |
| 185.156.73.52 | attack | 03/20/2020-10:27:33.456309 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-03-20 22:42:44 |
| 206.221.176.146 | attack | ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-03-20 23:24:27 |
| 92.118.160.9 | attackspambots | GPL DNS named version attempt - port: 53 proto: UDP cat: Attempted Information Leak |
2020-03-20 22:54:09 |
| 80.82.65.74 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-03-20 23:05:41 |
| 212.85.124.235 | spam | MARRE de ces ORDURES et autres FILS de PUTE genre SOUS MERDES capables de POLLUER STUPIDEMENT pour ne pas dire CONNEMENT la Planète par des POURRIELS INUTILES sur des listes VOLÉES on ne sait où et SANS notre accord ! X-Originating-IP: [213.171.216.60] Received: from 10.200.77.176 (EHLO smtp.livemail.co.uk) (213.171.216.60) by mta1047.mail.ir2.yahoo.com with SMTPS; Received: from mvtp (unknown [188.162.198.188]) (Authenticated sender: web@keepfitwithkelly.co.uk) by smtp.livemail.co.uk (Postfix) with ESMTPSA id EB0D52805CD; Message-ID: <0d619dcec5ee3b3711a41241b573595531f1e6ff@keepfitwithkelly.co.uk> Reply-To: Jennifer From: Jennifer keepfitwithkelly.co.uk (FALSE EMPTY Web Site to STOP to host and destroiy IP and access keys !)>fasthosts.co.uk keepfitwithkelly.co.uk>88.208.252.239 88.208.252.239>fasthosts.co.uk https://www.mywot.com/scorecard/keepfitwithkelly.co.uk https://www.mywot.com/scorecard/fasthosts.co.uk https://en.asytech.cn/check-ip/88.208.252.239 ortaggi.co.uk>one.com>joker.com one.com>195.47.247.9 joker.com>194.245.148.200 194.245.148.200>nrw.net which resend to csl.de nrw.net>joker.com csl.de>nrw.net https://www.mywot.com/scorecard/one.com https://www.mywot.com/scorecard/joker.com https://www.mywot.com/scorecard/nrw.net https://www.mywot.com/scorecard/csl.de https://en.asytech.cn/check-ip/195.47.247.9 https://en.asytech.cn/check-ip/194.245.148.200 which send to : https://honeychicksfinder.com/pnguakzjfkmgrtk%3Ft%3Dshh&sa=D&sntz=1&usg=AFQjCNGvyrBCDGwYkoLXFlDkbYHNh0OsYg honeychicksfinder.com>gdpr-masked.com honeychicksfinder.com>104.27.137.81 gdpr-masked.com>endurance.com AGAIN... https://www.mywot.com/scorecard/honeychicksfinder.com https://www.mywot.com/scorecard/gdpr-masked.com https://www.mywot.com/scorecard/endurance.com https://en.asytech.cn/check-ip/104.27.137.81 |
2020-03-20 23:19:59 |
| 176.113.115.209 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 3365 proto: TCP cat: Misc Attack |
2020-03-20 22:44:36 |
| 45.138.172.57 | attack | Portscan or hack attempt detected by psad/fwsnort |
2020-03-20 23:18:33 |
| 60.195.191.5 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 45 - port: 1433 proto: TCP cat: Misc Attack |
2020-03-20 23:13:53 |