City: unknown
Region: unknown
Country: Latvia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.99.206.36
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42794
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;83.99.206.36. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 05:41:10 CST 2025
;; MSG SIZE rcvd: 105
36.206.99.83.in-addr.arpa domain name pointer balticom-206-36.balticom.lv.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
36.206.99.83.in-addr.arpa name = balticom-206-36.balticom.lv.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 106.13.189.172 | attack | Invalid user otrs from 106.13.189.172 port 41066 |
2020-10-01 00:07:07 |
| 118.97.23.26 | attack | SSH auth scanning - multiple failed logins |
2020-10-01 00:05:02 |
| 85.209.0.102 | attackbotsspam | Sep 30 12:41:22 vps46666688 sshd[19764]: Failed password for root from 85.209.0.102 port 36702 ssh2 ... |
2020-09-30 23:42:18 |
| 111.231.190.106 | attackbotsspam | k+ssh-bruteforce |
2020-10-01 00:06:22 |
| 45.129.33.84 | attackspambots |
|
2020-09-30 23:48:32 |
| 45.129.33.60 | attack | ET DROP Dshield Block Listed Source group 1 - port: 43270 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-01 00:22:41 |
| 91.121.176.34 | attack | $f2bV_matches |
2020-10-01 00:12:02 |
| 45.129.33.58 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 55504 proto: tcp cat: Misc Attackbytes: 60 |
2020-10-01 00:23:07 |
| 207.154.242.25 | attack | Invalid user admin from 207.154.242.25 port 53966 |
2020-09-30 23:55:03 |
| 87.242.234.181 | attackbots | fail2ban: brute force SSH detected |
2020-10-01 00:12:17 |
| 45.129.33.12 | attackspam |
|
2020-09-30 23:51:07 |
| 202.77.105.98 | attackbotsspam | 2020-09-29 15:18:01 server sshd[7724]: Failed password for invalid user ftp01 from 202.77.105.98 port 58482 ssh2 |
2020-09-30 23:56:07 |
| 114.143.141.98 | attackspam | Sep 30 10:42:15 sso sshd[29145]: Failed password for root from 114.143.141.98 port 60276 ssh2 ... |
2020-10-01 00:05:36 |
| 61.7.147.29 | attackspambots | $f2bV_matches |
2020-10-01 00:17:58 |
| 5.189.130.92 | attackspam | firewall-block, port(s): 5038/tcp |
2020-09-30 23:52:51 |