City: unknown
Region: unknown
Country: Slovakia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.19.75.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;185.19.75.229. IN A
;; AUTHORITY SECTION:
. 409 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023100601 1800 900 604800 86400
;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 07 01:09:16 CST 2023
;; MSG SIZE rcvd: 106
229.75.19.185.in-addr.arpa domain name pointer stip-static-229.185-19-75.telekom.sk.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
229.75.19.185.in-addr.arpa name = stip-static-229.185-19-75.telekom.sk.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
66.249.65.138 | attackspam | Automatic report - Banned IP Access |
2020-02-08 09:05:52 |
218.103.116.121 | attack | Brute force attempt |
2020-02-08 08:36:58 |
40.77.191.247 | attackspam | 43 attempts against mh-misbehave-ban on float |
2020-02-08 08:49:15 |
173.163.192.1 | attackbotsspam | firewall-block, port(s): 23/tcp |
2020-02-08 09:09:18 |
197.157.20.202 | attack | 1433/tcp 445/tcp... [2019-12-09/2020-02-07]13pkt,2pt.(tcp) |
2020-02-08 08:34:50 |
179.6.205.176 | attack | Email rejected due to spam filtering |
2020-02-08 08:45:46 |
185.220.102.8 | attackspambots | Automatic report - Banned IP Access |
2020-02-08 08:50:22 |
185.156.177.79 | attack | 3389/tcp 3389/tcp 3389/tcp [2020-02-05/06]3pkt |
2020-02-08 08:49:44 |
150.136.246.63 | attack | 22111/tcp 3301/tcp [2019-12-24/2020-02-07]2pkt |
2020-02-08 08:26:17 |
37.187.132.5 | attackspambots | Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools |
2020-02-08 08:56:38 |
221.214.74.10 | attackspam | Feb 7 14:32:46 web1 sshd\[9211\]: Invalid user nwb from 221.214.74.10 Feb 7 14:32:46 web1 sshd\[9211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.214.74.10 Feb 7 14:32:48 web1 sshd\[9211\]: Failed password for invalid user nwb from 221.214.74.10 port 2533 ssh2 Feb 7 14:34:30 web1 sshd\[9372\]: Invalid user wgj from 221.214.74.10 Feb 7 14:34:30 web1 sshd\[9372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.214.74.10 |
2020-02-08 08:38:29 |
223.26.48.64 | attackbots | 27017/tcp 7443/tcp 8443/tcp... [2020-01-08/02-07]10pkt,5pt.(tcp) |
2020-02-08 08:43:20 |
200.10.132.117 | attack | 445/tcp 1433/tcp... [2019-12-20/2020-02-07]6pkt,2pt.(tcp) |
2020-02-08 08:29:22 |
82.99.193.52 | attack | 445/tcp 1433/tcp... [2019-12-10/2020-02-07]6pkt,2pt.(tcp) |
2020-02-08 08:27:58 |
187.130.75.153 | attack | Email rejected due to spam filtering |
2020-02-08 08:51:37 |