City: Amsterdam
Region: North Holland
Country: Netherlands
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.109.17.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19406
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;145.109.17.130. IN A
;; AUTHORITY SECTION:
. 539 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010502 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 06 12:19:29 CST 2022
;; MSG SIZE rcvd: 107
130.17.109.145.in-addr.arpa domain name pointer wcw-stud-145-109-17-130.wireless.uva.nl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
130.17.109.145.in-addr.arpa name = wcw-stud-145-109-17-130.wireless.uva.nl.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
92.118.161.53 | attackbotsspam |
|
2020-10-01 07:10:55 |
193.27.228.154 | attackbots | scans 16 times in preceeding hours on the ports (in chronological order) 4782 4721 3588 5177 4596 3784 4662 5156 5072 5493 4490 5079 4620 5262 5500 4785 resulting in total of 51 scans from 193.27.228.0/23 block. |
2020-10-01 07:02:29 |
89.248.168.51 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 4022 resulting in total of 70 scans from 89.248.160.0-89.248.174.255 block. |
2020-10-01 07:13:40 |
104.206.128.26 | attackbotsspam | 5060/tcp 1433/tcp 23/tcp... [2020-07-31/09-30]27pkt,8pt.(tcp),1pt.(udp) |
2020-10-01 07:08:14 |
111.40.7.84 | attack |
|
2020-10-01 07:06:36 |
59.126.29.54 | attackbotsspam | 23/tcp 23/tcp 23/tcp... [2020-08-02/09-30]4pkt,1pt.(tcp) |
2020-10-01 06:53:03 |
58.217.157.46 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60 |
2020-10-01 06:53:28 |
102.165.30.13 | attackbots |
|
2020-10-01 06:43:51 |
45.64.128.160 | attackbots | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-10-01 06:56:42 |
167.248.133.29 | attackspam |
|
2020-10-01 06:37:52 |
45.143.221.85 | attackspambots | " " |
2020-10-01 06:54:36 |
71.6.232.6 | attackbots | UDP port : 123 |
2020-10-01 06:51:13 |
193.254.245.162 | attackbotsspam | firewall-block, port(s): 5060/udp |
2020-10-01 07:01:33 |
106.12.15.239 | attack | 2020-09-30T23:49:51+0200 Failed SSH Authentication/Brute Force Attack. (Server 9) |
2020-10-01 06:40:39 |
77.88.5.72 | attackbots | CF RAY ID: 5da7dc5f1d0375ab IP Class: searchEngine URI: / |
2020-10-01 06:50:56 |