City: Cambridge
Region: England
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: Virgin Media Limited
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.5.214.235
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3038
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.5.214.235. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019071400 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 15 00:47:53 CST 2019
;; MSG SIZE rcvd: 116
235.214.5.80.in-addr.arpa domain name pointer cpc108963-cmbg20-2-0-cust746.5-4.cable.virginm.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
235.214.5.80.in-addr.arpa name = cpc108963-cmbg20-2-0-cust746.5-4.cable.virginm.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
185.175.93.6 | attackbotsspam | Port 33896 scan denied |
2020-04-17 06:55:35 |
51.89.67.61 | attackspambots | ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-04-17 06:45:04 |
104.140.188.22 | attackbots | Port 3389 (MS RDP) access denied |
2020-04-17 07:00:15 |
185.173.35.21 | attack | Apr 17 00:40:08 debian-2gb-nbg1-2 kernel: \[9335787.559278\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.173.35.21 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=239 ID=60498 PROTO=TCP SPT=55003 DPT=2121 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-04-17 07:18:30 |
64.225.14.108 | attackspambots | Port 20897 scan denied |
2020-04-17 07:11:32 |
185.175.93.14 | attackbotsspam | Port 4333 scan denied |
2020-04-17 06:55:16 |
45.56.91.156 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 26 - port: 23475 proto: TCP cat: Misc Attack |
2020-04-17 06:48:00 |
185.175.93.104 | attack | 04/16/2020-18:32:14.522721 185.175.93.104 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-04-17 06:54:34 |
141.98.81.138 | attackbots | ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak |
2020-04-17 06:58:39 |
222.128.43.40 | attackbotsspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-17 06:52:33 |
151.229.240.33 | attackbots | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-04-17 06:57:30 |
85.93.20.248 | attack | firewall-block, port(s): 3663/tcp |
2020-04-17 07:05:59 |
115.202.109.242 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-17 06:59:56 |
51.158.31.194 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 35 - port: 5060 proto: UDP cat: Misc Attack |
2020-04-17 07:12:48 |
45.134.179.243 | attack | Port 3300 scan denied |
2020-04-17 06:47:33 |