City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.93.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3894
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.93.200. IN A
;; AUTHORITY SECTION:
. 257 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022062402 1800 900 604800 86400
;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 25 10:10:48 CST 2022
;; MSG SIZE rcvd: 107
200.93.229.169.in-addr.arpa domain name pointer pri-93-200.reshall.berkeley.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
200.93.229.169.in-addr.arpa name = pri-93-200.reshall.berkeley.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
31.135.49.216 | attackspam | Unauthorized connection attempt detected from IP address 31.135.49.216 to port 445 [T] |
2020-07-22 01:20:41 |
52.139.40.10 | attackbots | Unauthorized connection attempt detected from IP address 52.139.40.10 to port 1433 [T] |
2020-07-22 01:17:43 |
13.68.247.181 | attack | port scan and connect, tcp 1433 (ms-sql-s) |
2020-07-22 01:44:46 |
92.222.74.255 | attackbots | Jul 21 17:58:37 santamaria sshd\[5391\]: Invalid user ashish from 92.222.74.255 Jul 21 17:58:37 santamaria sshd\[5391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.74.255 Jul 21 17:58:39 santamaria sshd\[5391\]: Failed password for invalid user ashish from 92.222.74.255 port 47278 ssh2 ... |
2020-07-22 01:34:29 |
185.30.12.137 | attackbots | Unauthorized connection attempt detected from IP address 185.30.12.137 to port 8080 [T] |
2020-07-22 01:28:54 |
40.127.78.155 | attackbots | 2020-07-22 01:19:17 | |
49.235.46.16 | attack | leo_www |
2020-07-22 01:39:54 |
188.244.226.90 | attack | Unauthorized connection attempt detected from IP address 188.244.226.90 to port 445 [T] |
2020-07-22 01:48:50 |
107.6.183.162 | attack | Unauthorized connection attempt detected from IP address 107.6.183.162 to port 1099 |
2020-07-22 01:31:56 |
73.205.101.200 | attackspam | Unauthorized connection attempt detected from IP address 73.205.101.200 to port 23 |
2020-07-22 01:14:56 |
104.43.217.180 | attack | Unauthorized connection attempt detected from IP address 104.43.217.180 to port 1433 [T] |
2020-07-22 01:53:09 |
89.248.174.193 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 5986 proto: tcp cat: Misc Attackbytes: 60 |
2020-07-22 01:13:57 |
103.59.58.108 | attackbots | Unauthorized connection attempt detected from IP address 103.59.58.108 to port 445 [T] |
2020-07-22 01:33:12 |
51.140.3.126 | attackbots | Unauthorized connection attempt detected from IP address 51.140.3.126 to port 1433 |
2020-07-22 01:39:12 |
194.87.138.123 | attackspambots | firewall-block, port(s): 8088/tcp |
2020-07-22 01:47:08 |