City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime | 
|---|---|---|---|
| 64.204.217.25 | attackbotsspam | Honeypot hit.  | 
                    2020-01-13 13:28:10 | 
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.204.2.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31354
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.204.2.54.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110100 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 02 00:13:03 CST 2025
;; MSG SIZE  rcvd: 104
        Host 54.2.204.64.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 54.2.204.64.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 123.31.43.117 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-07-05 22:58:24 | 
| 51.75.52.127 | attackbotsspam | scans once in preceeding hours on the ports (in chronological order) 6588 resulting in total of 1 scans from 51.75.52.0/22 block.  | 
                    2020-07-05 22:22:08 | 
| 63.143.32.122 | attack | *Port Scan* detected from 63.143.32.122 (US/United States/Texas/Dallas/122-32-143-63.static.reverse.lstn.net). 4 hits in the last 15 seconds  | 
                    2020-07-05 22:20:27 | 
| 185.39.11.34 | attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 18 - port: 3992 proto: TCP cat: Misc Attack  | 
                    2020-07-05 22:55:08 | 
| 125.117.96.125 | attackbotsspam | Unauthorized connection attempt detected from IP address 125.117.96.125 to port 445  | 
                    2020-07-05 22:36:29 | 
| 192.241.227.83 | attack | ET DROP Dshield Block Listed Source group 1 - port: 4567 proto: TCP cat: Misc Attack  | 
                    2020-07-05 22:28:08 | 
| 45.227.254.30 | attackspambots | 
  | 
                    2020-07-05 22:47:13 | 
| 185.39.10.66 | attackspam | 07/05/2020-08:28:39.468048 185.39.10.66 Protocol: 6 ET SCAN NMAP -sS window 1024  | 
                    2020-07-05 22:32:29 | 
| 94.102.51.16 | attackspambots | Jul 5 16:15:44 debian-2gb-nbg1-2 kernel: \[16217157.887682\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.51.16 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=44224 PROTO=TCP SPT=41772 DPT=44417 WINDOW=1024 RES=0x00 SYN URGP=0  | 
                    2020-07-05 22:38:15 | 
| 46.101.6.56 | attackbotsspam | 
  | 
                    2020-07-05 22:46:57 | 
| 150.109.99.68 | attackbotsspam | Jul 5 16:31:48 PorscheCustomer sshd[7730]: Failed password for root from 150.109.99.68 port 45100 ssh2 Jul 5 16:34:11 PorscheCustomer sshd[7774]: Failed password for postgres from 150.109.99.68 port 33504 ssh2 ...  | 
                    2020-07-05 22:57:01 | 
| 51.178.78.154 | attackspambots | 
  | 
                    2020-07-05 22:45:29 | 
| 64.225.115.188 | attack | scans once in preceeding hours on the ports (in chronological order) 20057 resulting in total of 4 scans from 64.225.0.0/17 block.  | 
                    2020-07-05 22:44:16 | 
| 92.63.197.88 | attackspam | 07/05/2020-09:33:53.472635 92.63.197.88 Protocol: 6 ET SCAN NMAP -sS window 1024  | 
                    2020-07-05 23:01:32 | 
| 92.63.196.8 | attackspam | ET CINS Active Threat Intelligence Poor Reputation IP group 85 - port: 62846 proto: TCP cat: Misc Attack  | 
                    2020-07-05 22:40:38 |