City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 229.254.221.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2691
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;229.254.221.104. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 04:46:09 CST 2025
;; MSG SIZE rcvd: 108
Host 104.221.254.229.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 104.221.254.229.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 175.196.206.113 | attackbotsspam | Unauthorized connection attempt detected from IP address 175.196.206.113 to port 23 [J] |
2020-03-03 00:05:02 |
| 103.137.148.142 | attackbots | Unauthorized connection attempt detected from IP address 103.137.148.142 to port 23 [J] |
2020-03-02 23:36:45 |
| 84.200.110.124 | spam | MARRE de ces ORDURES et autres FILS de PUTE genre SOUS MERDES capables de POLLUER STUPIDEMENT pour ne pas dire CONNEMENT la Planète par des POURRIELS INUTILES sur des listes VOLÉES on ne sait où et SANS notre accord, en TOTALE INFRACTION avec les Législations Européennes comme Française sur la RGPD, donc à condamner à 750 € par pourriel émis, et tout ça pour du CUL, du SEXE... info@gurdet.co.cr => 190.0.224.183 qui renvoie sur : http://www.superpuperr.blogspot.com/9itfhgbkjn9ijnrfhgbkjngvgv http://www.superpuperr.blogspot.com/56rjkn09igvhjbkjnjnkjn9irsvhjbhjbkjngv https://en.asytech.cn/check-ip/190.0.224.183 190.0.224.183 => cyberfuel.com gurdet.co.cr => 190.0.230.72 https://www.mywot.com/scorecard/gurdet.co.cr https://en.asytech.cn/check-ip/190.0.230.72 gurdet.co.cr resend to zonaempresarial.org zonaempresarial.org => 1&1 IONOS SE - 1&1 Internet Inc zonaempresarial.org => 23.236.62.147 https://www.mywot.com/scorecard/zonaempresarial.org https://en.asytech.cn/check-ip/23.236.62.147 In fact the union of the big German and American shits, what else ? https://www.mywot.com/scorecard/1api.net https://www.mywot.com/scorecard/cyberfuel.com |
2020-03-03 00:08:39 |
| 173.12.132.177 | attackspambots | Unauthorized connection attempt detected from IP address 173.12.132.177 to port 8080 [J] |
2020-03-03 00:05:38 |
| 217.217.90.149 | attack | Mar 2 16:48:24 MK-Soft-VM5 sshd[18252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.217.90.149 Mar 2 16:48:26 MK-Soft-VM5 sshd[18252]: Failed password for invalid user test from 217.217.90.149 port 49768 ssh2 ... |
2020-03-02 23:53:15 |
| 175.6.133.182 | attackbots | SASL broute force |
2020-03-02 23:29:31 |
| 121.173.128.14 | attackspambots | Unauthorized connection attempt detected from IP address 121.173.128.14 to port 81 [J] |
2020-03-03 00:10:18 |
| 83.130.224.18 | attackbotsspam | Unauthorized connection attempt detected from IP address 83.130.224.18 to port 23 [J] |
2020-03-02 23:43:14 |
| 79.196.118.51 | attackbotsspam | Unauthorized connection attempt detected from IP address 79.196.118.51 to port 80 [J] |
2020-03-02 23:44:08 |
| 37.193.175.55 | attackbotsspam | Unauthorized connection attempt detected from IP address 37.193.175.55 to port 23 [J] |
2020-03-02 23:49:04 |
| 119.165.26.11 | attackspambots | Unauthorized connection attempt detected from IP address 119.165.26.11 to port 23 [J] |
2020-03-02 23:32:46 |
| 104.248.244.182 | attackbots | Unauthorized connection attempt detected from IP address 104.248.244.182 to port 6000 [J] |
2020-03-02 23:36:26 |
| 177.11.121.11 | attack | Unauthorized connection attempt detected from IP address 177.11.121.11 to port 8080 [J] |
2020-03-03 00:04:35 |
| 114.34.107.111 | attackspam | Unauthorized connection attempt detected from IP address 114.34.107.111 to port 4567 [J] |
2020-03-02 23:34:45 |
| 219.235.6.221 | attack | Unauthorized connection attempt detected from IP address 219.235.6.221 to port 1433 [J] |
2020-03-02 23:52:54 |