City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 162.144.102.72 | attackbotsspam | Dec 10 15:53:43 grey postfix/smtpd\[26739\]: NOQUEUE: reject: RCPT from leto.zen-wala.com\[162.144.102.72\]: 554 5.7.1 Service unavailable\; Client host \[162.144.102.72\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?162.144.102.72\; from=\ |
2019-12-10 23:52:36 |
| 162.144.102.140 | attackspam | TCP src-port=35738 dst-port=25 dnsbl-sorbs abuseat-org barracuda (143) |
2019-07-09 20:58:33 |
| 162.144.102.140 | attackspam | Jul 5 06:16:06 mxgate1 postfix/postscreen[8519]: CONNECT from [162.144.102.140]:55156 to [176.31.12.44]:25 Jul 5 06:16:06 mxgate1 postfix/dnsblog[8673]: addr 162.144.102.140 listed by domain cbl.abuseat.org as 127.0.0.2 Jul 5 06:16:06 mxgate1 postfix/dnsblog[8675]: addr 162.144.102.140 listed by domain zen.spamhaus.org as 127.0.0.4 Jul 5 06:16:06 mxgate1 postfix/dnsblog[8674]: addr 162.144.102.140 listed by domain bl.spamcop.net as 127.0.0.2 Jul 5 06:16:06 mxgate1 postfix/dnsblog[8672]: addr 162.144.102.140 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2 Jul 5 06:16:06 mxgate1 postfix/dnsblog[8671]: addr 162.144.102.140 listed by domain b.barracudacentral.org as 127.0.0.2 Jul 5 06:16:12 mxgate1 postfix/postscreen[8519]: DNSBL rank 6 for [162.144.102.140]:55156 Jul x@x Jul 5 06:16:13 mxgate1 postfix/postscreen[8519]: HANGUP after 0.81 from [162.144.102.140]:55156 in tests after SMTP handshake Jul 5 06:16:13 mxgate1 postfix/postscreen[8519]: DISCONNECT [162.144........ ------------------------------- |
2019-07-07 02:09:44 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.144.102.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3917
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;162.144.102.54. IN A
;; AUTHORITY SECTION:
. 91 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400
;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 19:51:23 CST 2022
;; MSG SIZE rcvd: 107
54.102.144.162.in-addr.arpa domain name pointer server.ehealthnetworkaz.org.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
54.102.144.162.in-addr.arpa name = server.ehealthnetworkaz.org.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 222.73.136.205 | attackbotsspam | Port Scan: TCP/445 |
2019-08-24 13:48:17 |
| 67.217.160.101 | attack | Port Scan: UDP/500 |
2019-08-24 14:29:18 |
| 23.83.90.216 | attack | Port Scan: TCP/443 |
2019-08-24 13:45:34 |
| 173.212.63.34 | attackbotsspam | Port Scan: UDP/137 |
2019-08-24 14:21:38 |
| 59.126.132.206 | attackbotsspam | Port Scan: TCP/23 |
2019-08-24 15:00:01 |
| 155.138.162.30 | attackspam | Invalid user admin from 155.138.162.30 port 45206 |
2019-08-24 13:56:48 |
| 42.245.203.134 | attack | Port Scan: TCP/445 |
2019-08-24 14:32:30 |
| 222.139.214.149 | attackspam | Port Scan: TCP/1433 |
2019-08-24 13:47:43 |
| 189.68.249.18 | attack | Port Scan: TCP/23 |
2019-08-24 14:44:37 |
| 96.224.232.132 | attackspambots | Port Scan: UDP/80 |
2019-08-24 14:02:41 |
| 113.252.242.253 | attack | Port Scan: TCP/445 |
2019-08-24 14:00:17 |
| 52.203.41.130 | attackspambots | Port Scan: UDP/68 |
2019-08-24 14:31:48 |
| 114.223.170.75 | attackbotsspam | Port Scan: TCP/23 |
2019-08-24 13:59:43 |
| 38.75.137.198 | attack | Port Scan: TCP/60304 |
2019-08-24 14:11:57 |
| 66.70.181.9 | attack | Port Scan: TCP/18760 |
2019-08-24 14:06:20 |