City: unknown
Region: unknown
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: AT&T Corp.
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.102.253.110
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18579
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;216.102.253.110. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019082500 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 26 00:46:22 CST 2019
;; MSG SIZE rcvd: 119
Host 110.253.102.216.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server: 67.207.67.3
Address: 67.207.67.3#53
** server can't find 110.253.102.216.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
27.50.49.204 | attackbots | firewall-block, port(s): 445/tcp |
2019-09-12 02:13:57 |
198.108.67.110 | attackbots | 09/11/2019-07:15:11.591967 198.108.67.110 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-09-12 02:17:28 |
37.120.152.186 | attack | Sep 11 08:53:14 lenivpn01 kernel: \[417597.190259\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=37.120.152.186 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=48327 DPT=11211 WINDOW=65535 RES=0x00 SYN URGP=0 Sep 11 10:29:09 lenivpn01 kernel: \[423352.422544\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=37.120.152.186 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=33857 DPT=123 WINDOW=65535 RES=0x00 SYN URGP=0 Sep 11 12:50:10 lenivpn01 kernel: \[431813.112569\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=37.120.152.186 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=36341 DPT=389 WINDOW=65535 RES=0x00 SYN URGP=0 Sep 11 16:05:17 lenivpn01 kernel: \[443519.662701\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=37.120.152.186 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=2 ... |
2019-09-12 00:48:44 |
45.136.109.36 | attackspam | Sep 11 17:09:24 mc1 kernel: \[765130.010837\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.36 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=27833 PROTO=TCP SPT=44601 DPT=4331 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 11 17:11:26 mc1 kernel: \[765251.792766\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.36 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=23541 PROTO=TCP SPT=44601 DPT=4397 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 11 17:11:33 mc1 kernel: \[765258.258287\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.36 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=36978 PROTO=TCP SPT=44601 DPT=4472 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-09-12 00:41:39 |
92.119.160.143 | attack | proto=tcp . spt=57610 . dpt=3389 . src=92.119.160.143 . dst=xx.xx.4.1 . (listed on rbldns-ru) (650) |
2019-09-12 01:20:32 |
71.6.232.5 | attack | Unauthorised access (Sep 11) SRC=71.6.232.5 LEN=40 TOS=0x10 PREC=0x40 TTL=234 ID=54321 TCP DPT=139 WINDOW=65535 SYN Unauthorised access (Sep 11) SRC=71.6.232.5 LEN=40 TOS=0x10 PREC=0x40 TTL=234 ID=54321 TCP DPT=137 WINDOW=65535 SYN Unauthorised access (Sep 10) SRC=71.6.232.5 LEN=40 TOS=0x10 PREC=0x40 TTL=234 ID=54321 TCP DPT=135 WINDOW=65535 SYN |
2019-09-12 02:33:08 |
125.64.94.211 | attackspambots | 11.09.2019 17:01:05 Connection to port 6379 blocked by firewall |
2019-09-12 01:56:45 |
198.108.67.88 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-09-12 02:18:30 |
207.226.155.196 | attackspambots | Unauthorised access (Sep 11) SRC=207.226.155.196 LEN=40 TTL=243 ID=55254 TCP DPT=445 WINDOW=1024 SYN |
2019-09-12 00:54:29 |
92.53.65.95 | attackspam | Sep 10 18:03:17 lenivpn01 kernel: \[364201.623226\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=92.53.65.95 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=9517 PROTO=TCP SPT=46590 DPT=8389 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 10 19:11:43 lenivpn01 kernel: \[368308.187912\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=92.53.65.95 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=9037 PROTO=TCP SPT=46590 DPT=33849 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 10 23:02:22 lenivpn01 kernel: \[382146.330113\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=92.53.65.95 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=61677 PROTO=TCP SPT=46590 DPT=3351 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 11 01:01:14 lenivpn01 kernel: \[389277.949460\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=92.53.65.95 DST=195.201.121.15 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=34366 PRO ... |
2019-09-12 01:27:53 |
82.221.105.6 | attackbots | Portscan or hack attempt detected by psad/fwsnort |
2019-09-12 02:29:17 |
193.32.163.44 | attack | Port scan |
2019-09-12 00:56:49 |
162.144.89.205 | attackspambots | Port scan attempt detected by AWS-CCS, CTS, India |
2019-09-12 01:10:54 |
185.176.27.118 | attackspam | 09/11/2019-13:58:57.321659 185.176.27.118 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-09-12 02:21:25 |
37.49.227.109 | attackbotsspam | 09/11/2019-12:11:13.980632 37.49.227.109 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 22 |
2019-09-12 00:50:04 |