City: unknown
Region: unknown
Country: Taiwan (Province of China)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.71.132.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44346
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;219.71.132.221.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:21:37 CST 2025
;; MSG SIZE  rcvd: 107221.132.71.219.in-addr.arpa domain name pointer host-219-71-132-221.dynamic.kbtelecom.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
221.132.71.219.in-addr.arpa	name = host-219-71-132-221.dynamic.kbtelecom.net.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 59.2.50.133 | attackbotsspam | WEB Remote Command Execution via Shell Script -1.a | 2019-06-27 01:31:56 | 
| 69.158.249.57 | attackspam | Jun 26 15:11:13 vserver sshd\[5841\]: Failed password for root from 69.158.249.57 port 3999 ssh2Jun 26 15:11:15 vserver sshd\[5841\]: Failed password for root from 69.158.249.57 port 3999 ssh2Jun 26 15:11:18 vserver sshd\[5841\]: Failed password for root from 69.158.249.57 port 3999 ssh2Jun 26 15:11:20 vserver sshd\[5841\]: Failed password for root from 69.158.249.57 port 3999 ssh2 ... | 2019-06-27 01:54:18 | 
| 103.60.126.65 | attackspam | Jun 26 12:49:00 plusreed sshd[14200]: Invalid user us from 103.60.126.65 ... | 2019-06-27 01:56:56 | 
| 51.75.52.127 | attack | Port scan: Attack repeated for 24 hours | 2019-06-27 01:52:52 | 
| 222.253.82.121 | attackbots | Unauthorized connection attempt from IP address 222.253.82.121 on Port 445(SMB) | 2019-06-27 01:19:16 | 
| 137.74.154.197 | attack | ZTE Router Exploit Scanner | 2019-06-27 02:00:51 | 
| 94.54.66.173 | attack | DATE:2019-06-26 15:11:23, IP:94.54.66.173, PORT:ssh brute force auth on SSH service (patata) | 2019-06-27 01:52:29 | 
| 184.105.139.105 | attack | 873/tcp 11211/tcp 9200/tcp... [2019-04-27/06-26]55pkt,11pt.(tcp),3pt.(udp) | 2019-06-27 01:52:06 | 
| 184.105.139.72 | attackspambots | 21/tcp 50070/tcp 30005/tcp... [2019-04-26/06-26]44pkt,17pt.(tcp),1pt.(udp) | 2019-06-27 01:40:45 | 
| 115.29.5.66 | attackbotsspam | TCP src-port=53730 dst-port=25 dnsbl-sorbs abuseat-org barracuda (898) | 2019-06-27 01:49:09 | 
| 154.0.173.85 | attackspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 01:22:49,651 INFO [shellcode_manager] (154.0.173.85) no match, writing hexdump (ea84f5d4a40f6b9ddd7a7981d52afdec :2098627) - MS17010 (EternalBlue) | 2019-06-27 02:01:39 | 
| 103.3.177.140 | attackbotsspam | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 01:30:31,712 INFO [shellcode_manager] (103.3.177.140) no match, writing hexdump (c436e647cf9383cf17259b2fb08ae0bc :1821378) - MS17010 (EternalBlue) | 2019-06-27 01:57:30 | 
| 94.245.134.228 | attack | port scan and connect, tcp 80 (http) | 2019-06-27 01:36:52 | 
| 51.77.201.36 | attackbotsspam | Brute force attempt | 2019-06-27 01:23:10 | 
| 115.159.39.30 | attackspam | Automatic report - Web App Attack | 2019-06-27 01:17:45 |