City: Vöcklabruck
Region: Oberosterreich
Country: Austria
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.81.209.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;193.81.209.252. IN A
;; AUTHORITY SECTION:
. 293 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022102000 1800 900 604800 86400
;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 21 00:13:25 CST 2022
;; MSG SIZE rcvd: 107
252.209.81.193.in-addr.arpa domain name pointer 193-81-209-252.adsl.highway.telekom.at.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
252.209.81.193.in-addr.arpa name = 193-81-209-252.adsl.highway.telekom.at.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
94.53.199.106 | attackspam | Unauthorized connection attempt detected from IP address 94.53.199.106 to port 81 [J] |
2020-01-29 05:18:30 |
182.247.245.72 | attack | Unauthorized connection attempt detected from IP address 182.247.245.72 to port 2220 [J] |
2020-01-29 05:28:07 |
188.255.251.205 | attackspambots | Unauthorized connection attempt detected from IP address 188.255.251.205 to port 80 [J] |
2020-01-29 05:39:49 |
122.116.90.39 | attackbotsspam | Unauthorized connection attempt detected from IP address 122.116.90.39 to port 23 [J] |
2020-01-29 05:30:13 |
93.150.12.182 | attackbotsspam | Unauthorized connection attempt detected from IP address 93.150.12.182 to port 8080 [J] |
2020-01-29 05:44:30 |
77.42.92.250 | attack | Unauthorized connection attempt detected from IP address 77.42.92.250 to port 23 [J] |
2020-01-29 05:21:46 |
139.199.200.91 | attack | Unauthorized connection attempt detected from IP address 139.199.200.91 to port 1433 [J] |
2020-01-29 05:53:50 |
178.94.8.29 | attackbotsspam | Unauthorized connection attempt detected from IP address 178.94.8.29 to port 23 [J] |
2020-01-29 05:52:36 |
92.118.161.37 | attackbotsspam | Unauthorized connection attempt detected from IP address 92.118.161.37 to port 8088 [J] |
2020-01-29 05:19:18 |
178.212.53.1 | attackbots | Unauthorized connection attempt detected from IP address 178.212.53.1 to port 23 [J] |
2020-01-29 05:28:32 |
99.183.144.132 | attackbotsspam | Unauthorized connection attempt detected from IP address 99.183.144.132 to port 2220 [J] |
2020-01-29 05:43:51 |
5.188.64.253 | attack | Unauthorized connection attempt detected from IP address 5.188.64.253 to port 83 [J] |
2020-01-29 05:25:38 |
111.197.148.93 | attackspambots | Unauthorized connection attempt detected from IP address 111.197.148.93 to port 1433 [J] |
2020-01-29 05:54:05 |
14.225.5.28 | attackspam | Unauthorized connection attempt detected from IP address 14.225.5.28 to port 1433 [J] |
2020-01-29 05:35:36 |
222.186.15.158 | attack | SSH Brute Force, server-1 sshd[3338]: Failed password for root from 222.186.15.158 port 52148 ssh2 |
2020-01-29 05:47:33 |