City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.39.243.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25029
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;16.39.243.97. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031300 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 13 19:12:51 CST 2025
;; MSG SIZE rcvd: 105
Host 97.243.39.16.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 97.243.39.16.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
182.112.211.69 | attack | 23/tcp [2020-01-27]1pkt |
2020-01-28 07:34:49 |
207.154.229.50 | attackspam | Invalid user elasticsearch from 207.154.229.50 port 53226 |
2020-01-28 07:34:31 |
91.221.211.1 | attackbotsspam | 2019-09-23 14:38:53 1iCNcC-0001UL-Il SMTP connection from \(\[91.221.211.1\]\) \[91.221.211.1\]:34307 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-23 14:38:59 1iCNcI-0001UY-Px SMTP connection from \(\[91.221.211.1\]\) \[91.221.211.1\]:35424 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-09-23 14:39:03 1iCNcM-0001WD-SN SMTP connection from \(\[91.221.211.1\]\) \[91.221.211.1\]:6440 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-28 07:08:32 |
92.222.209.223 | attackspam | 92.222.209.223 Trying to hack sip phones to make fraud sip calls |
2020-01-28 07:26:54 |
91.219.222.189 | attackspambots | 2019-03-01 12:59:12 H=nat-189.opti.net.ua \[91.219.222.189\]:36382 I=\[193.107.88.166\]:25 F=\ |
2020-01-28 07:11:03 |
138.197.221.114 | attackbotsspam | Unauthorized connection attempt detected from IP address 138.197.221.114 to port 2220 [J] |
2020-01-28 07:45:18 |
81.12.5.136 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-28 07:17:05 |
200.87.233.68 | attackspambots | $f2bV_matches |
2020-01-28 07:18:40 |
93.38.117.22 | attackbots | Jan 27 18:34:28 prox sshd[11798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.38.117.22 Jan 27 18:34:30 prox sshd[11798]: Failed password for invalid user r from 93.38.117.22 port 52420 ssh2 |
2020-01-28 07:40:26 |
91.204.113.84 | attackspam | 2020-01-25 13:38:46 1ivKi5-0000WA-3o SMTP connection from \(\[91.204.113.84\]\) \[91.204.113.84\]:14064 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-01-25 13:39:06 1ivKiP-0000YF-5S SMTP connection from \(\[91.204.113.84\]\) \[91.204.113.84\]:14208 I=\[193.107.88.166\]:25 closed by DROP in ACL 2020-01-25 13:39:26 1ivKih-0000Z7-F2 SMTP connection from \(\[91.204.113.84\]\) \[91.204.113.84\]:14339 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-28 07:23:28 |
91.191.41.234 | attack | 2019-07-06 23:34:56 1hjsKc-0004Pg-L2 SMTP connection from \(41.191.91.si234.zona.ba\) \[91.191.41.234\]:22282 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-06 23:35:00 1hjsKh-0004Pp-5J SMTP connection from \(41.191.91.si234.zona.ba\) \[91.191.41.234\]:22326 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-06 23:35:02 1hjsKj-0004Pq-P3 SMTP connection from \(41.191.91.si234.zona.ba\) \[91.191.41.234\]:22348 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-28 07:32:53 |
91.205.188.181 | attackbots | 2019-07-08 18:57:52 1hkWxb-0006Rx-Q1 SMTP connection from \(\[91.205.188.181\]\) \[91.205.188.181\]:15315 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-08 18:58:07 1hkWxp-0006SB-Q5 SMTP connection from \(\[91.205.188.181\]\) \[91.205.188.181\]:15399 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-08 18:58:21 1hkWy4-0006SG-9x SMTP connection from \(\[91.205.188.181\]\) \[91.205.188.181\]:15473 I=\[193.107.88.166\]:25 closed by DROP in ACL ... |
2020-01-28 07:20:09 |
94.25.228.61 | attack | 1580150070 - 01/27/2020 19:34:30 Host: 94.25.228.61/94.25.228.61 Port: 445 TCP Blocked |
2020-01-28 07:40:06 |
218.234.32.89 | attackspambots | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-01-28 07:24:00 |
113.53.82.10 | attack | Honeypot attack, port: 445, PTR: node-g7e.pool-113-53.dynamic.totinternet.net. |
2020-01-28 07:12:32 |