City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 243.78.238.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;243.78.238.134. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 20:49:07 CST 2025
;; MSG SIZE rcvd: 107
Host 134.238.78.243.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 134.238.78.243.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.140.188.6 | attack | ET SCAN Suspicious inbound to PostgreSQL port 5432 - port: 5432 proto: TCP cat: Potentially Bad Traffic |
2020-06-21 07:23:04 |
| 85.209.0.100 | attackspam | firewall-block, port(s): 22/tcp |
2020-06-21 06:45:22 |
| 192.3.181.138 | attackspam | ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-06-21 06:56:41 |
| 170.130.187.54 | attackbotsspam | Unauthorized connection attempt detected from IP address 170.130.187.54 to port 3389 |
2020-06-21 07:20:51 |
| 62.4.14.123 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 60 - port: 5060 proto: UDP cat: Misc Attack |
2020-06-21 06:49:05 |
| 85.209.0.101 | attack |
|
2020-06-21 06:45:08 |
| 176.117.64.48 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-06-21 07:19:58 |
| 185.53.88.247 | attack |
|
2020-06-21 07:00:26 |
| 67.227.152.142 | attackbotsspam | Jun 21 00:44:58 debian-2gb-nbg1-2 kernel: \[14951781.015683\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=67.227.152.142 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=29087 PROTO=TCP SPT=32767 DPT=8545 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-06-21 06:47:47 |
| 68.183.55.223 | attackbotsspam | Multiport scan 65 ports : 101 399 427 593 960 2431 3512 3994 5699 7673 7936 8901 9064 9159 9533 9615 13308 13354 13622 13682 14404 14669 15593 16078 16742 17053 17638 18549 18592 18786 18931 19040 19244 19541 20820 21576 21728 21816 22530 22973 23437 23523 23596 24488 24742 24783 25652 26116 27328 27448 27804 28449 28749 28915 29184 29262 29304 30967 31308 31385 31426 31443 32177 32193 32669 |
2020-06-21 06:47:33 |
| 185.175.93.3 | attack | 06/20/2020-17:21:27.492157 185.175.93.3 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-06-21 07:16:45 |
| 71.6.232.4 | attack | Unauthorized connection attempt detected from IP address 71.6.232.4 to port 8443 |
2020-06-21 07:08:25 |
| 185.39.11.32 | attackspam | Jun 21 00:50:06 [host] kernel: [9321513.943762] [U Jun 21 00:51:32 [host] kernel: [9321599.618207] [U Jun 21 00:54:47 [host] kernel: [9321794.735732] [U Jun 21 00:55:05 [host] kernel: [9321813.025781] [U Jun 21 01:00:35 [host] kernel: [9322142.102036] [U Jun 21 01:07:58 [host] kernel: [9322585.147450] [U |
2020-06-21 07:19:20 |
| 185.175.93.17 | attackbotsspam | SmallBizIT.US 8 packets to tcp(8320,8340,8353,8361,8409,8433,8488,8502) |
2020-06-21 07:16:20 |
| 87.251.74.144 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 55444 proto: TCP cat: Misc Attack |
2020-06-21 07:06:19 |