City: unknown
Region: unknown
Country: Brazil
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 187.118.141.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19448
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;187.118.141.244.		IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 03:03:17 CST 2025
;; MSG SIZE  rcvd: 108
        244.141.118.187.in-addr.arpa domain name pointer ip-187-118-141-244.user.vivozap.com.br.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
244.141.118.187.in-addr.arpa	name = ip-187-118-141-244.user.vivozap.com.br.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 117.149.164.157 | attack | [portscan] tcp/23 [TELNET] *(RWIN=29716)(08041230)  | 
                    2019-08-05 04:10:31 | 
| 124.166.61.76 | attackspam | [portscan] tcp/23 [TELNET] *(RWIN=28770)(08041230)  | 
                    2019-08-05 04:07:54 | 
| 150.95.172.156 | attackbotsspam | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08041230)  | 
                    2019-08-05 03:40:03 | 
| 203.154.78.176 | attack | 445/tcp 445/tcp 445/tcp... [2019-06-06/08-04]17pkt,1pt.(tcp)  | 
                    2019-08-05 03:57:41 | 
| 41.162.117.34 | attack | [SMB remote code execution attempt: port tcp/445] *(RWIN=8192)(08041230)  | 
                    2019-08-05 03:52:45 | 
| 165.22.36.110 | attackspambots | [portscan] tcp/22 [SSH] [scan/connect: 2 time(s)] *(RWIN=65535)(08041230)  | 
                    2019-08-05 03:39:12 | 
| 14.163.111.42 | attack | Automatic report - Port Scan Attack  | 
                    2019-08-05 03:53:41 | 
| 122.165.154.179 | attackspam | [portscan] tcp/23 [TELNET] *(RWIN=51196)(08041230)  | 
                    2019-08-05 03:41:04 | 
| 121.143.44.133 | attackbotsspam | [portscan] tcp/23 [TELNET] [scan/connect: 3 time(s)] *(RWIN=29648)(08041230)  | 
                    2019-08-05 03:42:08 | 
| 180.94.71.4 | attackspam | Port Scan: TCP/445  | 
                    2019-08-05 04:03:58 | 
| 208.100.26.228 | attackbots | 08/04/2019-15:50:53.895724 208.100.26.228 Protocol: 6 ET SCAN NMAP -sS window 1024  | 
                    2019-08-05 03:56:22 | 
| 167.71.199.63 | attackspambots | [portscan] tcp/23 [TELNET] [scan/connect: 17 time(s)] *(RWIN=1454)(08041230)  | 
                    2019-08-05 03:38:42 | 
| 116.104.93.66 | attackbots | [portscan] tcp/23 [TELNET] *(RWIN=43822)(08041230)  | 
                    2019-08-05 03:42:27 | 
| 47.254.152.71 | attack | [portscan] tcp/23 [TELNET] *(RWIN=60531)(08041230)  | 
                    2019-08-05 03:50:15 | 
| 121.234.80.120 | attackspambots | [portscan] tcp/23 [TELNET] *(RWIN=16958)(08041230)  | 
                    2019-08-05 04:09:20 |