City: Daegu
Region: Daegu Metropolitan City
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.38.110.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8988
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;211.38.110.248. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024121101 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 11:39:51 CST 2024
;; MSG SIZE rcvd: 107
Host 248.110.38.211.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 248.110.38.211.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
58.64.171.69 | attack | 445/tcp 445/tcp 445/tcp... [2019-05-11/07-11]17pkt,1pt.(tcp) |
2019-07-11 15:59:48 |
124.243.198.187 | attackspambots | Invalid user tester from 124.243.198.187 port 39758 |
2019-07-11 15:59:21 |
117.4.56.55 | attack | 445/tcp 445/tcp [2019-05-17/07-11]2pkt |
2019-07-11 16:13:29 |
67.207.81.44 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-07-11 15:40:12 |
103.200.117.245 | attackspam | [portscan] tcp/1433 [MsSQL] *(RWIN=16384)(07111009) |
2019-07-11 16:04:41 |
69.16.147.54 | attack | (From samchristopher@businesspromoted.club) bissland.com is currently receiving 8.42k clicks from organic traffic. However, your competition is crushing it You can view detailed traffic analysis at https://www.spyfu.com/overview/domain?query=bissland.com 8.42k clicks are certainly not enough. We can certainly do better! We need to do better. It is not that difficult. With in-depth keyword research and on-page optimization it is doable. We will reverse engineer competitor's link building strategies and get the links from similar sources. Our method works and thats why we are happy to offer money back guarantee. Yes, for whatever reason if your site is not ranking on Google then we will refund your 100% payment. No questions asked. If you like my proposal then please let me know a good time and phone number to reach out to you and we will present detailed plan of action. Looking forward to working with you. Sam Devi Business Development Manager Business Promoted |
2019-07-11 15:50:33 |
104.238.116.94 | attackbots | Jul 11 05:47:08 sshgateway sshd\[6461\]: Invalid user heim from 104.238.116.94 Jul 11 05:47:08 sshgateway sshd\[6461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.238.116.94 Jul 11 05:47:10 sshgateway sshd\[6461\]: Failed password for invalid user heim from 104.238.116.94 port 49884 ssh2 |
2019-07-11 16:15:39 |
93.174.93.216 | attackspam | 11.07.2019 05:32:20 Connection to port 5903 blocked by firewall |
2019-07-11 15:45:35 |
191.53.223.240 | attackbotsspam | failed_logins |
2019-07-11 15:32:49 |
177.130.137.118 | attackbots | failed_logins |
2019-07-11 15:43:48 |
218.173.239.164 | attackbotsspam | 37215/tcp 37215/tcp 37215/tcp... [2019-07-08/10]7pkt,1pt.(tcp) |
2019-07-11 15:45:09 |
138.122.36.13 | attackbots | failed_logins |
2019-07-11 16:16:37 |
207.154.209.159 | attack | Jul 11 09:41:50 vps647732 sshd[21600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.209.159 Jul 11 09:41:52 vps647732 sshd[21600]: Failed password for invalid user sai from 207.154.209.159 port 39948 ssh2 ... |
2019-07-11 16:20:40 |
113.160.173.44 | attackspambots | Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445 |
2019-07-11 16:08:52 |
154.85.13.69 | attackspam | Jul 11 03:53:13 artelis kernel: [910832.880392] [UFW BLOCK] IN=eth0 OUT= MAC=c2:45:3b:cb:6e:17:ec:38:73:0c:70:30:08:00 SRC=154.85.13.69 DST=167.99.196.43 LEN=40 TOS=0x00 PREC=0x00 TTL=111 ID=256 PROTO=TCP SPT=6000 DPT=8080 WINDOW=16384 RES=0x00 SYN URGP=0 Jul 11 03:53:13 artelis kernel: [910832.880427] [UFW BLOCK] IN=eth0 OUT= MAC=c2:45:3b:cb:6e:17:ec:38:73:0c:70:30:08:00 SRC=154.85.13.69 DST=167.99.196.43 LEN=40 TOS=0x00 PREC=0x00 TTL=111 ID=256 PROTO=TCP SPT=6000 DPT=8888 WINDOW=16384 RES=0x00 SYN URGP=0 Jul 11 03:53:13 artelis kernel: [910832.881697] [UFW BLOCK] IN=eth0 OUT= MAC=c2:45:3b:cb:6e:17:ec:38:73:0c:18:30:08:00 SRC=154.85.13.69 DST=167.99.196.43 LEN=40 TOS=0x00 PREC=0x00 TTL=111 ID=256 PROTO=TCP SPT=6000 DPT=7777 WINDOW=16384 RES=0x00 SYN URGP=0 Jul 11 03:53:13 artelis kernel: [910832.881856] [UFW BLOCK] IN=eth0 OUT= MAC=c2:45:3b:cb:6e:17:ec:38:73:0c:18:30:08:00 SRC=154.85.13.69 DST=167.99.196.43 LEN=40 TOS=0x00 PREC=0x00 TTL=111 ID=256 PROTO=TCP SPT=6000 DPT=8899 WINDOW ... |
2019-07-11 15:39:36 |