City: unknown
Region: unknown
Country: Denmark
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 62.107.54.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34059
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;62.107.54.239. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025031401 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 15 04:28:45 CST 2025
;; MSG SIZE rcvd: 106
239.54.107.62.in-addr.arpa domain name pointer 62-107-54-239.norlyscustomer.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
239.54.107.62.in-addr.arpa name = 62-107-54-239.norlyscustomer.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
192.241.195.168 | attackspam | Unauthorized connection attempt from IP address 192.241.195.168 |
2020-03-27 18:10:27 |
209.159.144.250 | attackspambots | " " |
2020-03-27 18:00:21 |
163.121.146.140 | attackspambots | Unauthorised access (Mar 27) SRC=163.121.146.140 LEN=52 TTL=113 ID=23027 DF TCP DPT=445 WINDOW=8192 SYN |
2020-03-27 17:32:03 |
87.251.74.8 | attackspambots | firewall-block, port(s): 161/tcp, 291/tcp, 656/tcp |
2020-03-27 17:51:00 |
185.98.87.120 | attackspam | 11 packets to ports 3000 3396 3398 4389 4489 6000 10000 10010 12345 33893 33894 |
2020-03-27 17:38:59 |
164.132.73.220 | attack | firewall-block, port(s): 16000/tcp |
2020-03-27 17:41:05 |
194.26.29.129 | attackbots | Fail2Ban Ban Triggered |
2020-03-27 18:04:35 |
87.251.74.9 | attackbots | firewall-block, port(s): 3445/tcp, 3575/tcp, 3679/tcp, 3699/tcp, 3832/tcp, 3969/tcp |
2020-03-27 17:50:47 |
194.26.29.120 | attackbotsspam | 176 packets to ports 4001 4005 4006 4015 4017 4018 4032 4038 4042 4044 4048 4049 4055 4060 4061 4068 4074 4076 4083 4084 4087 4090 4091 4099 4118 4121 4131 4143 4146 4156 4157 4159 4171 4181 4183 4185 4193 4197 4206 4214 4220 4223 4231 4237 4248 4253 4260 4262, etc. |
2020-03-27 17:33:04 |
71.6.232.2 | attack | SIP/5060 Probe, BF, Hack - |
2020-03-27 18:33:43 |
192.241.238.152 | attackbots | [portscan] tcp/22 [SSH] *(RWIN=65535)(03271028) |
2020-03-27 18:08:26 |
45.143.220.33 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-03-27 17:56:15 |
162.243.132.26 | attackbots | Unauthorized connection attempt detected from IP address 162.243.132.26 to port 5094 [T] |
2020-03-27 18:19:43 |
80.82.64.73 | attack | scans 16 times in preceeding hours on the ports (in chronological order) 37689 39189 39389 37889 37289 41189 43089 41989 43089 43689 41689 41989 43289 40689 41589 41789 resulting in total of 133 scans from 80.82.64.0/20 block. |
2020-03-27 18:32:19 |
213.136.73.44 | attackbots | " " |
2020-03-27 17:32:25 |