City: unknown
Region: unknown
Country: Canada
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.11.4-P2-RedHat-9.11.4-9.P2.el7 <<>> 75.155.149.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50387
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;75.155.149.48. IN A
;; AUTHORITY SECTION:
. 10702 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019112000 1800 900 604800 86400
;; Query time: 0 msec
;; SERVER: 100.100.2.136#53(100.100.2.136)
;; WHEN: Wed Nov 20 16:19:40 CST 2019
;; MSG SIZE rcvd: 117
48.149.155.75.in-addr.arpa domain name pointer d75-155-149-48.bchsia.telus.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
48.149.155.75.in-addr.arpa name = d75-155-149-48.bchsia.telus.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
195.98.77.66 | attack | Unauthorized connection attempt detected from IP address 195.98.77.66 to port 445 [T] |
2020-08-16 03:44:43 |
47.145.19.115 | attackspambots | Unauthorized connection attempt detected from IP address 47.145.19.115 to port 23 [T] |
2020-08-16 03:57:41 |
220.136.198.18 | attackspam | Unauthorized connection attempt detected from IP address 220.136.198.18 to port 4899 [T] |
2020-08-16 04:01:10 |
13.126.122.159 | attackbotsspam | Unauthorized connection attempt detected from IP address 13.126.122.159 to port 6379 [T] |
2020-08-16 04:00:19 |
89.248.174.193 | attackbotsspam | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-08-16 03:52:18 |
79.134.5.154 | attack | Unauthorized connection attempt detected from IP address 79.134.5.154 to port 81 [T] |
2020-08-16 03:55:04 |
193.142.146.232 | attack | 1597518870 - 08/16/2020 02:14:30 Host: 193.142.146.232/193.142.146.232 Port: 4096 TCP Blocked ... |
2020-08-16 04:04:45 |
103.85.205.94 | attackbotsspam | Unauthorized connection attempt detected from IP address 103.85.205.94 to port 445 [T] |
2020-08-16 03:49:57 |
58.176.234.149 | attack | Unauthorized connection attempt detected from IP address 58.176.234.149 to port 5555 [T] |
2020-08-16 04:14:27 |
222.186.148.94 | attackspam | Unauthorized connection attempt detected from IP address 222.186.148.94 to port 5908 [T] |
2020-08-16 04:18:48 |
212.112.118.169 | attack | Unauthorized connection attempt detected from IP address 212.112.118.169 to port 23 [T] |
2020-08-16 04:02:09 |
176.123.203.152 | attackspam | Unauthorized connection attempt detected from IP address 176.123.203.152 to port 8080 [T] |
2020-08-16 03:46:46 |
182.253.122.40 | attack | Unauthorized connection attempt detected from IP address 182.253.122.40 to port 445 [T] |
2020-08-16 04:06:48 |
121.149.116.38 | attack | Unauthorized connection attempt detected from IP address 121.149.116.38 to port 81 [T] |
2020-08-16 04:09:01 |
51.91.247.125 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 40 - port: 636 proto: tcp cat: Misc Attackbytes: 60 |
2020-08-16 03:56:41 |