City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.245.115.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9434
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;164.245.115.94. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 19:57:38 CST 2025
;; MSG SIZE rcvd: 107
Host 94.115.245.164.in-addr.arpa not found: 2(SERVFAIL)
server can't find 164.245.115.94.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 83.228.97.22 | attackspam | Honeypot attack, port: 445, PTR: 83-228-97-22.btc-net.bg. |
2020-02-02 04:08:24 |
| 142.93.163.77 | attackbots | Unauthorized connection attempt detected from IP address 142.93.163.77 to port 2220 [J] |
2020-02-02 04:01:12 |
| 77.77.82.86 | attackbots | 20/2/1@08:34:00: FAIL: Alarm-Network address from=77.77.82.86 ... |
2020-02-02 04:05:09 |
| 139.255.61.253 | attack | Honeypot attack, port: 445, PTR: ln-static-139-255-61-253.link.net.id. |
2020-02-02 03:56:06 |
| 54.37.18.31 | spamattack | Vulnerability scanning & brute-force attack |
2020-02-02 03:48:07 |
| 142.93.133.86 | attack | ... |
2020-02-02 04:08:09 |
| 84.17.46.21 | attackbotsspam | (From jayroach@hotmail.co.uk) Аdult onlinе dаting phоnе numbers: http://ypvijdc.tajmahalblacktea.com/6 |
2020-02-02 03:58:06 |
| 45.192.165.214 | attackbots | Unauthorized connection attempt detected from IP address 45.192.165.214 to port 80 [J] |
2020-02-02 04:08:48 |
| 186.67.248.8 | attackspambots | SSH Brute Force, server-1 sshd[12297]: Failed password for invalid user ftpuser from 186.67.248.8 port 60667 ssh2 |
2020-02-02 03:47:58 |
| 142.93.137.22 | attack | ... |
2020-02-02 04:07:10 |
| 142.93.196.133 | attackbots | Unauthorized connection attempt detected from IP address 142.93.196.133 to port 2220 [J] |
2020-02-02 03:55:05 |
| 142.93.101.148 | attackbotsspam | Unauthorized connection attempt detected from IP address 142.93.101.148 to port 2220 [J] |
2020-02-02 04:11:51 |
| 142.93.212.168 | attack | Unauthorized connection attempt detected from IP address 142.93.212.168 to port 2220 [J] |
2020-02-02 03:49:19 |
| 172.68.189.129 | attackspambots | 02/01/2020-17:34:18.360708 172.68.189.129 Protocol: 6 ET WEB_SPECIFIC_APPS [PT OPEN] Drupalgeddon2 <8.3.9 <8.4.6 <8.5.1 RCE Through Registration Form (CVE-2018-7600) |
2020-02-02 03:45:15 |
| 142.44.243.160 | attackbots | Unauthorized connection attempt detected from IP address 142.44.243.160 to port 2220 [J] |
2020-02-02 04:15:09 |