City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.10.17.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60236
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;201.10.17.138. IN A
;; AUTHORITY SECTION:
. 236 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 11:20:01 CST 2022
;; MSG SIZE rcvd: 106
138.17.10.201.in-addr.arpa domain name pointer 201-10-17-138.paemt704.dsl.brasiltelecom.net.br.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
138.17.10.201.in-addr.arpa name = 201-10-17-138.paemt704.dsl.brasiltelecom.net.br.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
94.102.49.82 | attackspambots | Fail2Ban Ban Triggered |
2020-07-05 22:15:38 |
45.145.66.197 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 25 - port: 21076 proto: TCP cat: Misc Attack |
2020-07-05 22:24:09 |
94.76.81.58 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 88 - port: 23 proto: TCP cat: Misc Attack |
2020-07-05 22:38:45 |
92.63.196.25 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 85 - port: 50891 proto: TCP cat: Misc Attack |
2020-07-05 22:40:14 |
52.252.56.58 | attack | ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-07-05 22:20:56 |
192.241.227.243 | attackbotsspam | " " |
2020-07-05 22:07:19 |
92.63.196.28 | attackbots | 07/05/2020-10:09:16.587598 92.63.196.28 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-07-05 22:39:52 |
1.207.63.62 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-07-05 22:05:16 |
185.39.11.38 | attackbotsspam | firewall-block, port(s): 25702/tcp, 25706/tcp, 25748/tcp, 25784/tcp |
2020-07-05 22:32:08 |
200.188.19.31 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-07-05 22:06:30 |
185.39.11.39 | attackspambots |
|
2020-07-05 22:31:42 |
136.232.80.30 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-07-05 22:11:27 |
129.205.115.14 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-07-05 22:11:48 |
64.227.125.204 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 59 - port: 3773 proto: TCP cat: Misc Attack |
2020-07-05 22:19:38 |
167.71.186.157 | attack | GPL SNMP public access udp - port: 161 proto: UDP cat: Attempted Information Leak |
2020-07-05 22:10:10 |