City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.228.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 461
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.228.47. IN A
;; AUTHORITY SECTION:
. 500 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022062202 1800 900 604800 86400
;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 23 06:02:41 CST 2022
;; MSG SIZE rcvd: 107
47.228.229.169.in-addr.arpa domain name pointer fixed-169-229-228-47.ucbso.berkeley.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
47.228.229.169.in-addr.arpa name = fixed-169-229-228-47.ucbso.berkeley.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
61.120.152.11 | attackspambots | unauthorized connection attempt |
2020-02-04 19:20:47 |
164.52.24.178 | attackspambots | Unauthorized connection attempt detected from IP address 164.52.24.178 to port 2494 [J] |
2020-02-04 18:45:48 |
171.4.242.208 | attackspam | unauthorized connection attempt |
2020-02-04 19:01:45 |
178.46.210.189 | attack | unauthorized connection attempt |
2020-02-04 18:58:22 |
51.91.212.80 | attack | Unauthorized connection attempt detected from IP address 51.91.212.80 to port 4443 [J] |
2020-02-04 19:21:50 |
78.94.250.184 | attack | unauthorized connection attempt |
2020-02-04 19:17:51 |
91.235.75.129 | attackbots | unauthorized connection attempt |
2020-02-04 19:13:34 |
185.175.93.14 | attackbotsspam | 02/04/2020-05:34:43.248000 185.175.93.14 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-02-04 18:43:55 |
83.97.20.46 | attack | 02/04/2020-11:41:31.086807 83.97.20.46 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-02-04 18:50:36 |
77.235.28.32 | attackspambots | unauthorized connection attempt |
2020-02-04 19:18:22 |
178.137.17.146 | attackspam | firewall-block, port(s): 3445/tcp, 4089/tcp, 33334/tcp, 38389/tcp, 50389/tcp |
2020-02-04 18:57:15 |
194.26.29.129 | attackbotsspam | SIP/5060 Probe, BF, Hack - |
2020-02-04 18:53:26 |
172.104.76.217 | attackspambots | Fail2Ban Ban Triggered |
2020-02-04 19:00:35 |
39.104.54.218 | attackbots | Unauthorized connection attempt detected from IP address 39.104.54.218 to port 7001 [J] |
2020-02-04 18:51:30 |
122.118.218.113 | attackspambots | unauthorized connection attempt |
2020-02-04 19:04:38 |