City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.18.99.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44708
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;69.18.99.133. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400
;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 07:55:52 CST 2025
;; MSG SIZE rcvd: 105
133.99.18.69.in-addr.arpa domain name pointer 69-18-99-133.arpa.goskyhawk.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
133.99.18.69.in-addr.arpa name = 69-18-99-133.arpa.goskyhawk.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.64.128.160 | attack | Fail2Ban Ban Triggered |
2020-09-30 23:20:41 |
| 45.163.188.1 | attackspambots | bruteforce detected |
2020-09-30 22:49:11 |
| 114.113.81.130 | attack | [N3.H3.VM3] Port Scanner Detected Blocked by UFW |
2020-09-30 23:02:53 |
| 95.156.113.49 | attackbotsspam |
|
2020-09-30 23:08:07 |
| 92.118.161.21 | attackbots |
|
2020-09-30 23:09:15 |
| 200.216.59.194 | attackspam | Telnet/23 MH Probe, Scan, BF, Hack - |
2020-09-30 22:45:07 |
| 37.59.141.40 | attack | 37.59.141.40 - - [30/Sep/2020:02:27:32 +0200] "GET /wp-login.php HTTP/1.1" 200 8712 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 37.59.141.40 - - [30/Sep/2020:02:27:33 +0200] "POST /wp-login.php HTTP/1.1" 200 8942 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 37.59.141.40 - - [30/Sep/2020:02:27:34 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-09-30 22:54:53 |
| 206.189.88.253 | attackbots | Port scan: Attack repeated for 24 hours |
2020-09-30 22:45:54 |
| 195.246.57.116 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60 |
2020-09-30 23:24:02 |
| 120.194.194.86 | attackspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60 |
2020-09-30 23:02:07 |
| 148.72.23.247 | attackbotsspam | wp-login.php |
2020-09-30 22:47:03 |
| 94.102.56.238 | attackspam | TCP port : 5900 |
2020-09-30 23:08:21 |
| 193.27.228.157 | attack |
|
2020-09-30 22:59:19 |
| 5.149.206.240 | attackspambots | 31128/tcp 6646/tcp 18381/tcp... [2020-08-31/09-29]40pkt,18pt.(tcp) |
2020-09-30 23:22:55 |
| 103.145.13.221 | attack |
|
2020-09-30 23:05:05 |