City: unknown
Region: unknown
Country: Republic of China (ROC)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.71.217.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9107
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;219.71.217.42. IN A
;; AUTHORITY SECTION:
. 286 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 16:49:15 CST 2022
;; MSG SIZE rcvd: 106
42.217.71.219.in-addr.arpa domain name pointer host-219-71-217-42.dynamic.kbtelecom.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.217.71.219.in-addr.arpa name = host-219-71-217-42.dynamic.kbtelecom.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
88.218.17.124 | attack | Port 3389 (MS RDP) access denied |
2020-05-01 02:05:29 |
222.219.119.85 | attack | [portscan] tcp/23 [TELNET] *(RWIN=10063)(04301449) |
2020-05-01 01:49:55 |
192.253.224.194 | attack | [portscan] tcp/1433 [MsSQL] *(RWIN=1024)(04301449) |
2020-05-01 02:16:35 |
42.2.124.197 | attackbots | Port 23 (Telnet) access denied |
2020-05-01 02:11:38 |
45.169.43.170 | attackbotsspam | [portscan] tcp/23 [TELNET] *(RWIN=18950)(04301449) |
2020-05-01 02:10:19 |
177.38.20.55 | attackbots | [portscan] tcp/23 [TELNET] *(RWIN=14600)(04301449) |
2020-05-01 02:21:41 |
118.200.72.27 | attack | [portscan] tcp/23 [TELNET] *(RWIN=51891)(04301449) |
2020-05-01 02:00:45 |
89.248.168.202 | attack | firewall-block, port(s): 3353/tcp, 3366/tcp |
2020-05-01 02:04:07 |
114.40.146.85 | attackspambots | Port 23 (Telnet) access denied |
2020-05-01 02:29:25 |
222.186.175.182 | attackbotsspam | Apr 30 13:31:07 NPSTNNYC01T sshd[23313]: Failed password for root from 222.186.175.182 port 30554 ssh2 Apr 30 13:31:20 NPSTNNYC01T sshd[23313]: error: maximum authentication attempts exceeded for root from 222.186.175.182 port 30554 ssh2 [preauth] Apr 30 13:31:26 NPSTNNYC01T sshd[23334]: Failed password for root from 222.186.175.182 port 40926 ssh2 ... |
2020-05-01 01:50:40 |
51.91.212.81 | attackbots | Port scan(s) denied |
2020-05-01 02:08:55 |
220.133.220.233 | attackspam | [portscan] tcp/23 [TELNET] *(RWIN=2577)(04301449) |
2020-05-01 01:52:01 |
185.142.236.34 | attack | T: f2b postfix aggressive 3x |
2020-05-01 01:54:43 |
171.38.151.68 | attackspambots | [portscan] tcp/23 [TELNET] *(RWIN=44259)(04301449) |
2020-05-01 02:23:43 |
171.233.224.72 | attack | [portscan] tcp/23 [TELNET] *(RWIN=56853)(04301449) |
2020-05-01 02:22:30 |