City: Cacem
Region: Lisbon
Country: Portugal
Internet Service Provider: unknown
Hostname: unknown
Organization: Servicos De Comunicacoes E Multimedia S.A.
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.245.175.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41609
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.245.175.159. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019082901 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 30 01:34:19 CST 2019
;; MSG SIZE rcvd: 118
159.175.245.85.in-addr.arpa domain name pointer bl12-175-159.dsl.telepac.pt.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
159.175.245.85.in-addr.arpa name = bl12-175-159.dsl.telepac.pt.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
198.108.66.105 | attackspambots | [portscan] tcp/110 [POP3] *(RWIN=65535)(08041230) |
2019-08-05 02:19:43 |
197.210.53.51 | attackspam | [SMB remote code execution attempt: port tcp/445] *(RWIN=8192)(08041230) |
2019-08-05 02:20:29 |
78.188.88.186 | attack | [portscan] tcp/23 [TELNET] *(RWIN=19503)(08041230) |
2019-08-05 02:05:59 |
162.243.145.24 | attack | [portscan] tcp/26 [tcp/26] *(RWIN=65535)(08041230) |
2019-08-05 01:20:46 |
117.177.234.79 | attack | [portscan] tcp/23 [TELNET] *(RWIN=39706)(08041230) |
2019-08-05 01:55:48 |
190.206.46.43 | attackbotsspam | [portscan] tcp/23 [TELNET] *(RWIN=54031)(08041230) |
2019-08-05 02:21:31 |
171.97.177.133 | attackspam | Automatic report - Port Scan Attack |
2019-08-05 01:50:31 |
47.91.86.136 | attackspambots | [portscan] tcp/23 [TELNET] *(RWIN=53055)(08041230) |
2019-08-05 02:10:00 |
180.158.215.24 | attackspam | [SMB remote code execution attempt: port tcp/445] *(RWIN=8192)(08041230) |
2019-08-05 01:47:23 |
112.242.128.39 | attackbotsspam | [portscan] tcp/23 [TELNET] *(RWIN=10809)(08041230) |
2019-08-05 01:25:46 |
49.68.61.186 | attack | [portscan] tcp/22 [SSH] *(RWIN=21681)(08041230) |
2019-08-05 02:09:29 |
182.61.184.244 | attackbots | [SMB remote code execution attempt: port tcp/445] *(RWIN=8192)(08041230) |
2019-08-05 01:46:11 |
188.132.181.190 | attackspam | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08041230) |
2019-08-05 01:41:34 |
119.75.8.50 | attack | [portscan] tcp/23 [TELNET] *(RWIN=53525)(08041230) |
2019-08-05 01:54:47 |
182.125.192.110 | attack | [portscan] tcp/23 [TELNET] *(RWIN=64100)(08041230) |
2019-08-05 01:45:06 |