City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.44.84.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20686
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;64.44.84.40. IN A
;; AUTHORITY SECTION:
. 144 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 145 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:30:47 CST 2022
;; MSG SIZE rcvd: 104
40.84.44.64.in-addr.arpa domain name pointer 40-84-44-64.reverse-dns.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.84.44.64.in-addr.arpa name = 40-84-44-64.reverse-dns.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 85.11.20.165 | attackspam | [portscan] tcp/23 [TELNET] *(RWIN=42618)(08050931) |
2019-08-05 22:34:08 |
| 124.115.16.251 | attack | Unauthorised access (Aug 5) SRC=124.115.16.251 LEN=40 TTL=242 ID=46171 TCP DPT=445 WINDOW=1024 SYN |
2019-08-05 22:05:40 |
| 185.139.56.41 | attackspam | [SMB remote code execution attempt: port tcp/445] *(RWIN=8192)(08050931) |
2019-08-05 22:40:30 |
| 60.184.126.176 | attackbotsspam | [portscan] tcp/23 [TELNET] *(RWIN=22320)(08050931) |
2019-08-05 21:57:58 |
| 93.179.106.10 | attack | [SMB remote code execution attempt: port tcp/445] *(RWIN=8192)(08050931) |
2019-08-05 22:07:43 |
| 123.188.160.165 | attack | [portscan] tcp/23 [TELNET] *(RWIN=44559)(08050931) |
2019-08-05 22:45:12 |
| 117.132.10.61 | attackspambots | 2323/tcp 23/tcp... [2019-07-09/08-04]5pkt,2pt.(tcp) |
2019-08-05 22:46:06 |
| 68.183.83.164 | attackbots | Bruteforce on SSH Honeypot |
2019-08-05 22:50:15 |
| 125.227.84.5 | attackspambots | [portscan] tcp/23 [TELNET] *(RWIN=44527)(08050931) |
2019-08-05 22:28:33 |
| 103.240.140.10 | attack | MH/MP Probe, Scan, Hack - |
2019-08-05 22:47:29 |
| 37.75.10.98 | attackbots | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08050931) |
2019-08-05 22:10:05 |
| 170.80.227.99 | attackspam | [portscan] tcp/22 [SSH] *(RWIN=8275)(08050931) |
2019-08-05 21:54:08 |
| 139.162.65.76 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-08-05 22:16:06 |
| 131.72.125.238 | attack | [SMB remote code execution attempt: port tcp/445] *(RWIN=8192)(08050931) |
2019-08-05 22:44:45 |
| 104.140.188.10 | attack | TCP 3389 (RDP) |
2019-08-05 22:17:45 |