City: unknown
Region: unknown
Country: Lithuania
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.140.188.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34775
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;82.140.188.29. IN A
;; AUTHORITY SECTION:
. 44 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2021122901 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 30 02:37:21 CST 2021
;; MSG SIZE rcvd: 106
29.188.140.82.in-addr.arpa domain name pointer 29.188.140.82.static.lrtc.lt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
29.188.140.82.in-addr.arpa name = 29.188.140.82.static.lrtc.lt.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
89.122.35.124 | attack | 445/tcp [2020-10-05]1pkt |
2020-10-06 17:52:27 |
139.99.203.12 | attack | $f2bV_matches |
2020-10-06 18:20:20 |
85.204.200.50 | attackbots | 445/tcp [2020-10-05]1pkt |
2020-10-06 18:20:55 |
192.141.244.212 | attackbotsspam | 445/tcp [2020-10-05]1pkt |
2020-10-06 17:40:24 |
132.251.227.240 | attack | 445/tcp [2020-10-05]1pkt |
2020-10-06 17:53:54 |
120.78.11.170 | attack | T: f2b ssh aggressive 3x |
2020-10-06 18:01:15 |
93.39.116.254 | attackspambots | sshd: Failed password for .... from 93.39.116.254 port 54067 ssh2 (12 attempts) |
2020-10-06 17:48:14 |
118.127.209.15 | attackbotsspam | Unauthorised access (Oct 6) SRC=118.127.209.15 LEN=40 TOS=0x10 PREC=0x40 TTL=46 ID=47419 TCP DPT=8080 WINDOW=31879 SYN Unauthorised access (Oct 6) SRC=118.127.209.15 LEN=40 TOS=0x10 PREC=0x40 TTL=46 ID=51398 TCP DPT=8080 WINDOW=56637 SYN Unauthorised access (Oct 5) SRC=118.127.209.15 LEN=40 TOS=0x10 PREC=0x40 TTL=46 ID=35765 TCP DPT=8080 WINDOW=39493 SYN |
2020-10-06 17:58:23 |
210.195.241.8 | attack | 5555/tcp [2020-10-05]1pkt |
2020-10-06 17:43:17 |
190.245.95.122 | attackbots | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-06T05:45:17Z and 2020-10-06T05:54:34Z |
2020-10-06 17:53:35 |
223.231.88.243 | attackspambots | 1601930341 - 10/05/2020 22:39:01 Host: 223.231.88.243/223.231.88.243 Port: 445 TCP Blocked |
2020-10-06 17:41:58 |
139.99.40.44 | attackbots | Invalid user temp from 139.99.40.44 port 43296 |
2020-10-06 18:08:24 |
121.17.210.61 | attackspambots | Brute force attempt |
2020-10-06 18:15:19 |
85.237.63.27 | attackbotsspam | 445/tcp [2020-10-05]1pkt |
2020-10-06 18:10:58 |
135.181.106.49 | attack | Found on CINS badguys / proto=6 . srcport=6023 . dstport=23 Telnet . (385) |
2020-10-06 17:40:50 |