City: unknown
Region: unknown
Country: Denmark
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.106.82.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34247
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;2.106.82.25.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 01:26:35 CST 2025
;; MSG SIZE  rcvd: 104
        25.82.106.2.in-addr.arpa domain name pointer slt-vpn-2-106-82-25.eng.tdc.net.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
25.82.106.2.in-addr.arpa	name = slt-vpn-2-106-82-25.eng.tdc.net.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 187.144.227.100 | attackspam | Unauthorized connection attempt detected from IP address 187.144.227.100 to port 80 [J]  | 
                    2020-03-02 09:01:56 | 
| 187.167.6.178 | attackspam | Scanning random ports - tries to find possible vulnerable services  | 
                    2020-03-02 09:01:18 | 
| 187.33.235.50 | attackbotsspam | Scanning random ports - tries to find possible vulnerable services  | 
                    2020-03-02 09:07:03 | 
| 185.175.93.78 | attackbots | Mar 2 02:15:59 debian-2gb-nbg1-2 kernel: \[5370944.254839\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.78 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=26374 PROTO=TCP SPT=56275 DPT=39966 WINDOW=1024 RES=0x00 SYN URGP=0  | 
                    2020-03-02 09:28:40 | 
| 186.42.182.37 | attackspambots | Scanning random ports - tries to find possible vulnerable services  | 
                    2020-03-02 09:10:45 | 
| 185.172.110.238 | attackspambots | 185.172.110.238 was recorded 10 times by 10 hosts attempting to connect to the following ports: 6881,3702. Incident counter (4h, 24h, all-time): 10, 36, 168  | 
                    2020-03-02 09:29:41 | 
| 185.175.93.104 | attack | port  | 
                    2020-03-02 09:28:19 | 
| 189.87.142.202 | attackbots | Scanning random ports - tries to find possible vulnerable services  | 
                    2020-03-02 08:53:53 | 
| 185.200.118.36 | attackbots | Scanning random ports - tries to find possible vulnerable services  | 
                    2020-03-02 09:19:25 | 
| 101.109.250.83 | attackspambots | Unauthorized connection attempt detected from IP address 101.109.250.83 to port 23 [J]  | 
                    2020-03-02 08:59:16 | 
| 185.176.27.250 | attackbots | Excessive Port-Scanning  | 
                    2020-03-02 09:22:07 | 
| 185.209.0.91 | attack | 03/01/2020-19:39:00.901927 185.209.0.91 Protocol: 6 ET DROP Dshield Block Listed Source group 1  | 
                    2020-03-02 09:14:43 | 
| 187.94.188.46 | attackbotsspam | Scanning random ports - tries to find possible vulnerable services  | 
                    2020-03-02 09:02:50 | 
| 186.28.231.210 | attackspam | Scanning random ports - tries to find possible vulnerable services  | 
                    2020-03-02 09:11:05 | 
| 188.118.15.113 | attackbots | Scanning random ports - tries to find possible vulnerable services  | 
                    2020-03-02 08:57:14 |