City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.80.105.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;166.80.105.239. IN A
;; AUTHORITY SECTION:
. 343 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020060202 1800 900 604800 86400
;; Query time: 139 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 03 12:54:28 CST 2020
;; MSG SIZE rcvd: 118
;; connection timed out; no servers could be reached
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
Non-authoritative answer:
*** Can't find 239.105.80.166.in-addr.arpa.: No answer
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
183.82.117.78 | attackspam | [SMB remote code execution attempt: port tcp/445] *(RWIN=8192)(08041230) |
2019-08-05 00:07:50 |
121.16.60.125 | attack | [portscan] tcp/23 [TELNET] *(RWIN=6489)(08041230) |
2019-08-05 00:16:17 |
202.10.79.181 | attack | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08041230) |
2019-08-04 23:19:46 |
31.163.144.45 | attackspambots | [portscan] tcp/23 [TELNET] *(RWIN=9790)(08041230) |
2019-08-04 23:54:22 |
123.192.25.172 | attackspambots | [portscan] tcp/23 [TELNET] *(RWIN=1533)(08041230) |
2019-08-05 00:14:18 |
43.240.117.219 | attack | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08041230) |
2019-08-04 23:50:54 |
37.156.19.192 | attack | [SMB remote code execution attempt: port tcp/445] [scan/connect: 2 time(s)] *(RWIN=8192)(08041230) |
2019-08-04 23:53:54 |
113.10.169.18 | attackspam | Port Scan: TCP/445 |
2019-08-04 23:36:46 |
118.88.71.234 | attack | [portscan] tcp/23 [TELNET] *(RWIN=39663)(08041230) |
2019-08-05 00:17:20 |
198.108.67.62 | attack | [IPBX probe: SIP RTP=tcp/554] *(RWIN=1024)(08041230) |
2019-08-04 23:20:44 |
121.156.143.184 | attack | [portscan] tcp/23 [TELNET] *(RWIN=14129)(08041230) |
2019-08-04 23:33:36 |
119.167.11.55 | attack | [portscan] tcp/23 [TELNET] *(RWIN=5015)(08041230) |
2019-08-04 23:34:15 |
162.243.149.6 | attackbots | firewall-block, port(s): 40331/tcp |
2019-08-04 23:28:50 |
64.32.21.254 | attackbots | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08041230) |
2019-08-04 23:46:56 |
116.148.130.154 | attack | [portscan] tcp/23 [TELNET] *(RWIN=57577)(08041230) |
2019-08-05 00:17:44 |