City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.139.28.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64178
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;195.139.28.33. IN A
;; AUTHORITY SECTION:
. 191 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400
;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 10:26:56 CST 2022
;; MSG SIZE rcvd: 106
33.28.139.195.in-addr.arpa domain name pointer r3-et1.osl-skoy.inet.catchcom.no.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
33.28.139.195.in-addr.arpa name = r3-et1.osl-skoy.inet.catchcom.no.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
189.79.220.133 | attack | Unauthorized connection attempt detected from IP address 189.79.220.133 to port 8080 |
2020-05-12 23:59:23 |
121.169.51.38 | attackspam | Unauthorized connection attempt detected from IP address 121.169.51.38 to port 23 |
2020-05-13 00:48:11 |
49.234.17.252 | attackspam | firewall-block, port(s): 6379/tcp |
2020-05-13 00:25:18 |
89.248.167.131 | attackbots | 05/12/2020-11:42:47.243366 89.248.167.131 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 98 |
2020-05-13 00:55:23 |
79.7.171.156 | attackbots | port scan and connect, tcp 80 (http) |
2020-05-13 00:58:22 |
187.144.44.199 | attack | Unauthorized connection attempt detected from IP address 187.144.44.199 to port 23 |
2020-05-12 23:59:53 |
95.132.252.172 | attack | Unauthorized connection attempt detected from IP address 95.132.252.172 to port 23 |
2020-05-13 00:52:12 |
79.132.160.69 | attack | Unauthorized connection attempt detected from IP address 79.132.160.69 to port 23 |
2020-05-13 00:57:33 |
77.42.76.220 | attack | Unauthorized connection attempt detected from IP address 77.42.76.220 to port 23 |
2020-05-13 00:22:09 |
189.131.96.22 | attackbotsspam | Unauthorized connection attempt detected from IP address 189.131.96.22 to port 445 |
2020-05-13 00:37:42 |
138.186.179.32 | attackspam | Unauthorized connection attempt detected from IP address 138.186.179.32 to port 445 |
2020-05-13 00:06:54 |
213.240.218.15 | attack | Unauthorized connection attempt detected from IP address 213.240.218.15 to port 23 |
2020-05-12 23:51:29 |
211.197.144.103 | attackbotsspam | Unauthorized connection attempt detected from IP address 211.197.144.103 to port 81 |
2020-05-12 23:52:48 |
96.82.247.205 | attack | Unauthorized connection attempt detected from IP address 96.82.247.205 to port 80 |
2020-05-13 00:11:27 |
95.12.98.26 | attack | Unauthorized connection attempt detected from IP address 95.12.98.26 to port 23 |
2020-05-13 00:11:48 |