City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.102.67.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53710
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;34.102.67.139. IN A
;; AUTHORITY SECTION:
. 390 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:10:36 CST 2022
;; MSG SIZE rcvd: 106
139.67.102.34.in-addr.arpa domain name pointer 139.67.102.34.bc.googleusercontent.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.67.102.34.in-addr.arpa name = 139.67.102.34.bc.googleusercontent.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
144.217.34.148 | attack | 144.217.34.148 was recorded 14 times by 8 hosts attempting to connect to the following ports: 7001,3702. Incident counter (4h, 24h, all-time): 14, 41, 325 |
2020-01-30 09:52:34 |
49.67.108.205 | attack | Unauthorized connection attempt detected from IP address 49.67.108.205 to port 6656 [T] |
2020-01-30 09:13:35 |
183.88.21.127 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 30-01-2020 01:15:16. |
2020-01-30 09:53:32 |
180.249.180.70 | attackbotsspam | Unauthorized connection attempt from IP address 180.249.180.70 on Port 445(SMB) |
2020-01-30 09:27:45 |
14.230.138.156 | attackspambots | Unauthorized connection attempt from IP address 14.230.138.156 on Port 445(SMB) |
2020-01-30 09:42:52 |
117.66.87.16 | attackspam | Unauthorized connection attempt detected from IP address 117.66.87.16 to port 6656 [T] |
2020-01-30 09:06:38 |
131.72.222.167 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-30 09:34:54 |
111.206.221.85 | attack | The IP has triggered Cloudflare WAF. CF-Ray: 5569e661afd57872 | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: whitelist | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2020-01-30 09:37:15 |
115.237.69.3 | attackbotsspam | Unauthorized connection attempt detected from IP address 115.237.69.3 to port 6656 [T] |
2020-01-30 09:07:58 |
14.191.82.78 | attack | Unauthorized connection attempt from IP address 14.191.82.78 on Port 445(SMB) |
2020-01-30 09:53:14 |
121.46.26.126 | attackspam | ssh failed login |
2020-01-30 09:56:16 |
222.186.52.86 | attackbotsspam | Jan 29 19:47:13 ny01 sshd[31160]: Failed password for root from 222.186.52.86 port 33510 ssh2 Jan 29 19:47:37 ny01 sshd[31191]: Failed password for root from 222.186.52.86 port 17002 ssh2 |
2020-01-30 09:38:16 |
69.94.158.103 | attackspambots | Jan 30 02:16:51 |
2020-01-30 09:44:18 |
60.185.45.104 | attackspam | Unauthorized connection attempt detected from IP address 60.185.45.104 to port 6656 [T] |
2020-01-30 09:11:37 |
110.232.71.249 | attackbotsspam | Unauthorized connection attempt detected from IP address 110.232.71.249 to port 2220 [J] |
2020-01-30 09:54:54 |