City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.93.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48604
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.93.48. IN A
;; AUTHORITY SECTION:
. 289 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022062400 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 24 21:31:13 CST 2022
;; MSG SIZE rcvd: 106
48.93.229.169.in-addr.arpa domain name pointer pri-93-48.reshall.berkeley.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
48.93.229.169.in-addr.arpa name = pri-93-48.reshall.berkeley.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
115.153.102.109 | attack | Unauthorized connection attempt detected from IP address 115.153.102.109 to port 445 |
2020-01-01 04:10:06 |
194.135.233.150 | attackspambots | Unauthorized connection attempt detected from IP address 194.135.233.150 to port 445 |
2020-01-01 03:58:01 |
118.69.116.167 | attackspam | port scan and connect, tcp 23 (telnet) |
2020-01-01 04:09:33 |
218.206.136.27 | attack | Unauthorized connection attempt detected from IP address 218.206.136.27 to port 1433 |
2020-01-01 03:56:43 |
183.90.142.38 | attackbots | Unauthorized connection attempt detected from IP address 183.90.142.38 to port 12917 |
2020-01-01 04:00:05 |
47.97.103.214 | attackbotsspam | Unauthorized connection attempt detected from IP address 47.97.103.214 to port 1433 |
2020-01-01 03:51:18 |
116.62.247.38 | attack | Unauthorized connection attempt detected from IP address 116.62.247.38 to port 23 |
2020-01-01 04:09:46 |
123.8.90.78 | attack | Unauthorized connection attempt detected from IP address 123.8.90.78 to port 1433 |
2020-01-01 04:05:54 |
111.226.69.164 | attackspam | Unauthorized connection attempt detected from IP address 111.226.69.164 to port 9090 |
2020-01-01 03:42:40 |
58.220.56.3 | attack | Unauthorized connection attempt detected from IP address 58.220.56.3 to port 1433 |
2020-01-01 04:17:31 |
125.90.50.126 | attackspam | Unauthorized connection attempt detected from IP address 125.90.50.126 to port 445 |
2020-01-01 04:04:27 |
110.184.12.114 | attackbotsspam | Unauthorized connection attempt detected from IP address 110.184.12.114 to port 4567 |
2020-01-01 03:43:04 |
112.255.28.183 | attackspambots | Dec 31 20:27:29 debian-2gb-nbg1-2 kernel: \[79782.851635\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=112.255.28.183 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=231 ID=10239 PROTO=TCP SPT=51595 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-01-01 04:10:43 |
110.5.5.140 | attack | Unauthorized connection attempt detected from IP address 110.5.5.140 to port 23 |
2020-01-01 03:43:48 |
83.97.20.46 | attackspam | Unauthorized connection attempt detected from IP address 83.97.20.46 to port 80 |
2020-01-01 03:47:26 |