City: unknown
Region: unknown
Country: France
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.86.58.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59896
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;163.86.58.192.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:17:59 CST 2025
;; MSG SIZE  rcvd: 106
        Host 192.58.86.163.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 192.58.86.163.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 64.225.14.108 | attackspambots | Port 20897 scan denied  | 
                    2020-04-17 07:11:32 | 
| 66.232.63.37 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 55 - port: 8089 proto: TCP cat: Misc Attack  | 
                    2020-04-17 07:10:23 | 
| 74.63.228.198 | attack | Port 5140 scan denied  | 
                    2020-04-17 07:08:30 | 
| 65.49.20.120 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 54 - port: 443 proto: UDP cat: Misc Attack  | 
                    2020-04-17 07:10:45 | 
| 92.63.196.6 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 88 - port: 6353 proto: TCP cat: Misc Attack  | 
                    2020-04-17 07:03:10 | 
| 45.224.105.80 | attack | Sql/code injection probe  | 
                    2020-04-17 07:18:02 | 
| 192.126.160.253 | attackbotsspam | Unauthorized access detected from black listed ip!  | 
                    2020-04-17 07:20:10 | 
| 43.243.136.253 | attackbotsspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-04-17 07:16:21 | 
| 94.102.56.181 | attackbots | Multiport scan : 20 ports scanned 3392 9440 9443 9445 9446 9449 9452 9454 9455 9459 9463 9465 9469 9474 9479 9486 9490 45224 55678 65000  | 
                    2020-04-17 07:01:59 | 
| 141.98.81.138 | attackbots | ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak  | 
                    2020-04-17 06:58:39 | 
| 80.82.78.100 | attackspam | Multiport scan : 13 ports scanned 998 1023 1027 1030 1045 1051 1055 1060 1067 1088 1541 1646 2123  | 
                    2020-04-17 07:07:07 | 
| 80.82.78.104 | attack | DATE:2020-04-17 01:04:01, IP:80.82.78.104, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)  | 
                    2020-04-17 07:06:46 | 
| 137.74.159.147 | attack | $f2bV_matches  | 
                    2020-04-17 07:23:47 | 
| 185.175.93.104 | attack | 04/16/2020-18:32:14.522721 185.175.93.104 Protocol: 6 ET DROP Dshield Block Listed Source group 1  | 
                    2020-04-17 06:54:34 | 
| 58.19.198.18 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-04-17 07:12:22 |