City: Santiago de Querétaro
Region: Queretaro
Country: Mexico
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.96.146.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65285
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;201.96.146.22. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025032901 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 30 08:11:44 CST 2025
;; MSG SIZE rcvd: 106
22.146.96.201.in-addr.arpa domain name pointer customer-201-96-146-22.uninet-ide.com.mx.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
22.146.96.201.in-addr.arpa name = customer-201-96-146-22.uninet-ide.com.mx.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
45.134.179.87 | attackspambots | [Sun Apr 19 21:55:49 2020] - DDoS Attack From IP: 45.134.179.87 Port: 57440 |
2020-04-23 20:24:14 |
51.159.0.129 | attackbots | [ThuApr2312:32:47.6264492020][:error][pid1390:tid46998654879488][client51.159.0.129:49594][client51.159.0.129]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\\\\\\\\b\(\?:\\\\\\\\.\(\?:ht\(\?:access\|passwd\|group\)\|www_\?acl\)\|global\\\\\\\\.asa\|httpd\\\\\\\\.conf\|boot\\\\\\\\.ini\|web.config\)\\\\\\\\b\|\(\|\^\|\\\\\\\\.\\\\\\\\.\)/etc/\|/\\\\\\\\.\(\?:history\|bash_history\|sh_history\|env\)\$\)"atREQUEST_FILENAME.[file"/etc/apache2/conf.d/modsec_rules/10_asl_rules.conf"][line"211"][id"390709"][rev"30"][msg"Atomicorp.comWAFRules:Attempttoaccessprotectedfileremotely"][data"/.env"][severity"CRITICAL"][hostname"136.243.224.50"][uri"/.env"][unique_id"XqFuz2ThDBEChnyucJRm5wAAANU"][ThuApr2312:33:54.6598982020][:error][pid1188:tid46998631765760][client51.159.0.129:56804][client51.159.0.129]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\\\\\\\\b\(\?:\\\\\\\\.\(\?:ht\(\?:access\|passwd\|group\)\|www_\?acl\)\|global\\\\\\\\.asa\|httpd\\\\\\\\.conf\|boot\\ |
2020-04-23 20:19:25 |
80.82.64.46 | attackbotsspam | 04/23/2020-06:08:49.642187 80.82.64.46 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-04-23 20:14:13 |
103.44.144.4 | attackbotsspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-23 19:59:13 |
51.158.122.211 | attackspam | Apr 23 09:41:04 *** sshd[18000]: User root from 51.158.122.211 not allowed because not listed in AllowUsers |
2020-04-23 20:19:38 |
177.222.144.124 | attackbotsspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-04-23 19:55:46 |
183.167.240.116 | attackspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-23 19:55:23 |
82.202.197.233 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 69 - port: 2229 proto: TCP cat: Misc Attack |
2020-04-23 20:11:23 |
185.156.73.45 | attack | firewall-block, port(s): 8222/tcp, 8390/tcp |
2020-04-23 19:53:41 |
87.251.74.59 | attack | Port scan on 8 port(s): 1123 1457 1467 1481 1521 1617 1782 1801 |
2020-04-23 20:09:22 |
180.183.119.245 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-23 20:30:15 |
80.93.210.202 | attack | Unauthorized connection attempt detected from IP address 80.93.210.202 to port 10965 |
2020-04-23 20:12:05 |
87.251.74.249 | attackspambots | 04/23/2020-06:34:04.367445 87.251.74.249 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-04-23 20:07:59 |
45.148.10.141 | attackbotsspam | Scan & Hack |
2020-04-23 20:22:53 |
14.170.147.230 | attackspam | Unauthorized connection attempt from IP address 14.170.147.230 on Port 445(SMB) |
2020-04-23 20:26:36 |