City: Komaoka
Region: Kanagawa
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: Asahi Net
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.107.70.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 835
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.107.70.161. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019082400 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 25 01:21:46 CST 2019
;; MSG SIZE rcvd: 118
161.70.107.157.in-addr.arpa domain name pointer ag070161.dynamic.ppp.asahi-net.or.jp.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
161.70.107.157.in-addr.arpa name = ag070161.dynamic.ppp.asahi-net.or.jp.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
124.43.13.117 | attackbots | 1594907147 - 07/16/2020 15:45:47 Host: 124.43.13.117/124.43.13.117 Port: 445 TCP Blocked |
2020-07-17 02:46:27 |
116.236.41.165 | attackspam | Attempted connection to port 1433. |
2020-07-17 02:25:49 |
175.24.18.134 | attackspambots | Automatic report - Banned IP Access |
2020-07-17 02:20:15 |
220.133.90.181 | attackbots | Attempted connection to port 85. |
2020-07-17 02:15:54 |
89.248.169.12 | attack | Port Scan ... |
2020-07-17 02:32:34 |
85.105.22.82 | attackbotsspam | Unauthorized connection attempt from IP address 85.105.22.82 on Port 445(SMB) |
2020-07-17 02:12:19 |
162.243.128.37 | attack | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-07-17 02:43:05 |
221.155.59.5 | attackspambots | Invalid user database from 221.155.59.5 port 44054 |
2020-07-17 02:38:04 |
49.234.196.225 | attack | Unauthorized connection attempt detected from IP address 49.234.196.225 to port 7855 |
2020-07-17 02:19:57 |
195.54.160.163 | attack | SQL Injection in QueryString parameter: 387 AND 4719=(SELECT (CASE WHEN (4719=4719) THEN 4719 ELSE (SELECT 6311 UNION SELECT 1410) END))-- FIte |
2020-07-17 02:12:56 |
104.143.83.242 | attackbots |
|
2020-07-17 02:48:45 |
94.102.51.95 | attack | 07/16/2020-14:24:39.334715 94.102.51.95 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-07-17 02:44:07 |
41.60.232.29 | attack | Attempted connection to port 80. |
2020-07-17 02:14:59 |
172.245.245.46 | attackbots | Attempted connection to port 445. |
2020-07-17 02:20:41 |
206.72.195.16 | attack | Jul 16 15:32:23 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=206.72.195.16 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=13839 PROTO=TCP SPT=45416 DPT=63389 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 16 15:39:58 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=206.72.195.16 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=31547 PROTO=TCP SPT=45416 DPT=3388 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 16 15:57:01 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=206.72.195.16 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=46880 PROTO=TCP SPT=45416 DPT=43389 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 16 16:47:21 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=206.72.195.16 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=3522 PROTO=TCP SPT=45416 DPT=3393 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 16 16:55:14 *hidden* ke ... |
2020-07-17 02:30:19 |