City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.52.142.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49829
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;207.52.142.48. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 20:01:29 CST 2025
;; MSG SIZE rcvd: 106
b'Host 48.142.52.207.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 207.52.142.48.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
50.74.174.227 | attackspam | Unauthorized connection attempt from IP address 50.74.174.227 on Port 445(SMB) |
2020-02-29 01:16:18 |
42.116.65.69 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-29 01:09:31 |
124.119.208.60 | attackbots | Netgear DGN Device Remote Command Execution Vulnerability |
2020-02-29 01:19:15 |
162.252.58.148 | attack | Honeypot attack, port: 445, PTR: orcanet1724.com.ve. |
2020-02-29 01:32:44 |
77.40.27.78 | attack | Brute force attempt |
2020-02-29 01:33:21 |
80.68.0.142 | attackbots | Unauthorized connection attempt from IP address 80.68.0.142 on Port 445(SMB) |
2020-02-29 01:22:42 |
182.71.135.170 | attackbots | Unauthorized connection attempt from IP address 182.71.135.170 on Port 445(SMB) |
2020-02-29 01:29:00 |
49.7.20.96 | attackspambots | IP: 49.7.20.96 Ports affected World Wide Web HTTP (80) Found in DNSBL('s) ASN Details AS23724 IDC China Telecommunications Corporation China (CN) CIDR 49.7.0.0/16 Log Date: 28/02/2020 4:42:31 PM UTC |
2020-02-29 01:36:31 |
45.116.229.245 | attack | Distributed brute force attack |
2020-02-29 01:33:46 |
62.234.99.172 | attackbotsspam | Feb 28 14:00:02 Invalid user admin from 62.234.99.172 port 54433 |
2020-02-29 01:45:07 |
111.26.180.130 | attackspambots | Feb 28 15:25:27 vps sshd\[23536\]: Invalid user ubuntu from 111.26.180.130 Feb 28 15:54:26 vps sshd\[24090\]: Invalid user ubuntu from 111.26.180.130 ... |
2020-02-29 01:32:59 |
104.248.15.131 | attack | python-requests |
2020-02-29 01:27:38 |
113.21.117.250 | attackspam | Distributed brute force attack |
2020-02-29 01:27:14 |
209.17.96.106 | attackspam | The IP has triggered Cloudflare WAF. CF-Ray: 56c00668986c389e | WAF_Rule_ID: ipr24 | WAF_Kind: firewall | CF_Action: challenge | Country: US | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.0 (compatible; Nimbostratus-Bot/v1.3.2; http://cloudsystemnetworks.com) | CF_DC: ATL. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2020-02-29 01:06:23 |
178.134.24.150 | attack | Unauthorized connection attempt from IP address 178.134.24.150 on Port 445(SMB) |
2020-02-29 01:42:43 |