City: unknown
Region: unknown
Country: Kyrgyzstan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
IP | Type | Details | Datetime |
---|---|---|---|
212.42.122.75 | attackspambots | Port probing on unauthorized port 1433 |
2020-08-11 08:15:30 |
212.42.122.66 | attack | Unauthorized connection attempt detected from IP address 212.42.122.66 to port 21 [T] |
2020-01-30 17:18:01 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.42.122.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59870
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;212.42.122.148. IN A
;; AUTHORITY SECTION:
. 284 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 09:13:04 CST 2022
;; MSG SIZE rcvd: 107
148.122.42.212.in-addr.arpa domain name pointer 212-42-122-148.elcat.kg.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
148.122.42.212.in-addr.arpa name = 212-42-122-148.elcat.kg.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
41.111.132.33 | attack | Unauthorized connection attempt detected from IP address 41.111.132.33 to port 445 |
2020-01-08 00:54:13 |
117.64.226.45 | attackspam | SMTP nagging |
2020-01-08 01:30:12 |
198.27.80.123 | attack | Attempt to run wp-login.php |
2020-01-08 01:21:17 |
150.95.25.124 | attackbotsspam | Unauthorized connection attempt IP: 150.95.25.124 Ports affected Simple Mail Transfer (25) Message Submission (587) Abuse Confidence rating 31% ASN Details AS135161 GMO-Z com NetDesign Holdings Co. Ltd. Singapore (SG) CIDR 150.95.24.0/22 Log Date: 7/01/2020 12:53:55 PM UTC |
2020-01-08 01:26:33 |
80.211.43.205 | attackbots | Unauthorized connection attempt detected from IP address 80.211.43.205 to port 2220 [J] |
2020-01-08 01:13:06 |
181.211.112.2 | attack | Unauthorized connection attempt detected from IP address 181.211.112.2 to port 2220 [J] |
2020-01-08 00:53:56 |
41.41.71.195 | attack | Honeypot attack, port: 23, PTR: host-41.41.71.195.tedata.net. |
2020-01-08 01:25:29 |
223.71.167.163 | attackspambots | Unauthorized connection attempt detected from IP address 223.71.167.163 to port 3333 [T] |
2020-01-08 01:10:25 |
162.158.74.101 | attack | Fake GoogleBot |
2020-01-08 01:03:52 |
119.160.219.5 | attackbotsspam | Unauthorized connection attempt detected from IP address 119.160.219.5 to port 1433 [J] |
2020-01-08 01:02:53 |
149.202.216.239 | attack | Trying ports that it shouldn't be. |
2020-01-08 01:09:44 |
179.180.63.191 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 07-01-2020 13:00:15. |
2020-01-08 01:09:10 |
117.7.98.95 | attack | Unauthorized connection attempt from IP address 117.7.98.95 on Port 445(SMB) |
2020-01-08 01:04:57 |
159.203.36.154 | attack | Brute-force attempt banned |
2020-01-08 01:19:59 |
124.109.62.34 | attackbotsspam | firewall-block, port(s): 445/tcp |
2020-01-08 00:58:39 |