City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.219.199.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7899
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.219.199.211. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 21:08:01 CST 2025
;; MSG SIZE rcvd: 107
Host 211.199.219.42.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 211.199.219.42.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
92.118.160.9 | attackspam | 1025/tcp 139/tcp 5289/tcp... [2019-08-26/10-25]133pkt,69pt.(tcp),7pt.(udp),1tp.(icmp) |
2019-10-26 07:28:20 |
194.105.205.42 | attack | Invalid user ethos from 194.105.205.42 port 55564 |
2019-10-26 07:40:04 |
198.108.67.60 | attack | Port scan: Attack repeated for 24 hours |
2019-10-26 07:16:08 |
217.182.196.164 | attack | ET SCAN Sipvicious Scan - port: 5060 proto: UDP cat: Attempted Information Leak |
2019-10-26 07:38:46 |
45.136.108.38 | attackbots | ET SCAN MS Terminal Server Traffic on Non-standard Port - port: 1000 proto: TCP cat: Attempted Information Leak |
2019-10-26 07:10:47 |
94.102.51.108 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 94 - port: 3389 proto: TCP cat: Misc Attack |
2019-10-26 07:27:40 |
83.150.63.69 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 77 - port: 1433 proto: TCP cat: Misc Attack |
2019-10-26 07:31:56 |
89.248.162.136 | attackbots | 10/25/2019-19:25:25.650156 89.248.162.136 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 97 |
2019-10-26 07:31:36 |
185.176.27.98 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 2482 proto: TCP cat: Misc Attack |
2019-10-26 07:18:47 |
71.6.232.5 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 64 - port: 20005 proto: TCP cat: Misc Attack |
2019-10-26 07:35:05 |
31.184.215.239 | attackspambots | 10/25/2019-17:57:40.581196 31.184.215.239 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 21 |
2019-10-26 07:12:52 |
185.176.27.86 | attackbotsspam | 10/26/2019-01:04:06.317411 185.176.27.86 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-26 07:42:37 |
185.176.27.34 | attackspam | firewall-block, port(s): 2488/tcp, 2584/tcp |
2019-10-26 07:19:00 |
193.31.24.113 | attack | 10/26/2019-01:36:11.691684 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic |
2019-10-26 07:40:31 |
195.154.32.212 | attackbotsspam | ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak |
2019-10-26 07:16:44 |