City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.196.201.184
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43822
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;192.196.201.184. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 18:04:52 CST 2025
;; MSG SIZE rcvd: 108
184.201.196.192.in-addr.arpa domain name pointer 192.196.201.184.dynamic-pppoe.dt.ipv4.wtnet.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
184.201.196.192.in-addr.arpa name = 192.196.201.184.dynamic-pppoe.dt.ipv4.wtnet.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 5.135.253.172 | attack | Apr 17 00:46:50 debian-2gb-nbg1-2 kernel: \[9336188.832235\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=5.135.253.172 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=26708 PROTO=TCP SPT=58131 DPT=587 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-04-17 06:50:14 |
| 89.248.168.202 | attack | Multiport scan : 17 ports scanned 3391 5426 5428 5434 5438 5446 5447 5448 6029 6030 6032 6041 6043 6047 41011 48648 62666 |
2020-04-17 07:04:08 |
| 185.175.93.104 | attack | 04/16/2020-18:32:14.522721 185.175.93.104 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-04-17 06:54:34 |
| 87.251.74.11 | attack | Multiport scan : 29 ports scanned 233 577 686 899 995 1370 2240 2772 3275 4441 6255 6490 7175 7290 7450 7455 7654 8310 8460 9180 9340 9480 9545 19199 22622 27777 33338 44433 57777 |
2020-04-17 07:05:15 |
| 92.118.37.99 | attackbotsspam | Port 43120 scan denied |
2020-04-17 07:02:18 |
| 45.13.93.82 | attack | Port 22222 scan denied |
2020-04-17 06:48:31 |
| 143.208.221.244 | attackbotsspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-17 06:58:01 |
| 80.82.77.189 | attackbots | Excessive Port-Scanning |
2020-04-17 07:07:39 |
| 46.101.201.69 | attackspambots | Port 12339 scan denied |
2020-04-17 06:46:23 |
| 58.236.230.35 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 39 - port: 23 proto: TCP cat: Misc Attack |
2020-04-17 06:42:04 |
| 51.89.235.112 | attackspambots | 51.89.235.112 was recorded 7 times by 6 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 7, 28, 190 |
2020-04-17 06:44:34 |
| 185.175.93.15 | attackbotsspam | Port 23499 scan denied |
2020-04-17 06:55:04 |
| 36.153.205.142 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-17 06:49:48 |
| 185.175.93.6 | attackbotsspam | Port 33896 scan denied |
2020-04-17 06:55:35 |
| 87.251.74.13 | attackspambots | Port 1561 scan denied |
2020-04-17 06:31:14 |