City: Marudo
Region: Lombardy
Country: Italy
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.40.189.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35160
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.40.189.239. IN A
;; AUTHORITY SECTION:
. 266 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020050901 1800 900 604800 86400
;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 10 07:47:31 CST 2020
;; MSG SIZE rcvd: 117
239.189.40.85.in-addr.arpa domain name pointer host239-189-static.40-85-b.business.telecomitalia.it.
Server: 100.100.2.138
Address: 100.100.2.138#53
Non-authoritative answer:
239.189.40.85.in-addr.arpa name = host239-189-static.40-85-b.business.telecomitalia.it.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
125.16.124.198 | attack | [SMB remote code execution attempt: port tcp/445] *(RWIN=16384)(08041230) |
2019-08-05 03:06:58 |
139.162.109.43 | attack | Unauthorised access (Aug 4) SRC=139.162.109.43 LEN=40 TTL=245 ID=54321 TCP DPT=111 WINDOW=65535 SYN Unauthorised access (Aug 2) SRC=139.162.109.43 LEN=40 TTL=244 ID=54321 TCP DPT=111 WINDOW=65535 SYN Unauthorised access (Aug 1) SRC=139.162.109.43 LEN=40 TTL=242 ID=54321 TCP DPT=111 WINDOW=65535 SYN Unauthorised access (Jul 29) SRC=139.162.109.43 LEN=40 TTL=244 ID=54321 TCP DPT=111 WINDOW=65535 SYN |
2019-08-05 03:05:05 |
83.4.25.97 | attackbots | [portscan] tcp/23 [TELNET] *(RWIN=25879)(08041230) |
2019-08-05 03:15:08 |
162.243.144.22 | attackspam | firewall-block, port(s): 143/tcp |
2019-08-05 03:04:34 |
92.37.236.236 | attackbots | [portscan] tcp/22 [SSH] *(RWIN=54840)(08041230) |
2019-08-05 03:13:59 |
118.70.146.157 | attackbots | [portscan] tcp/23 [TELNET] *(RWIN=33446)(08041230) |
2019-08-05 03:08:52 |
116.31.141.194 | attackspambots | [portscan] tcp/21 [FTP] [scan/connect: 2 time(s)] *(RWIN=65535)(08041230) |
2019-08-05 03:42:57 |
182.176.169.97 | attackspambots | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08041230) |
2019-08-05 03:33:51 |
61.54.198.28 | attackspambots | [portscan] tcp/23 [TELNET] *(RWIN=12664)(08041230) |
2019-08-05 03:18:53 |
177.76.194.166 | attackspam | [portscan] tcp/23 [TELNET] *(RWIN=8897)(08041230) |
2019-08-05 03:03:35 |
192.227.217.41 | attackspambots | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08041230) |
2019-08-05 03:28:43 |
42.61.46.130 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2019-08-05 03:19:56 |
83.201.54.248 | attackbotsspam | [portscan] tcp/22 [SSH] *(RWIN=59834)(08041230) |
2019-08-05 03:14:15 |
187.115.165.204 | attack | Scanning random ports - tries to find possible vulnerable services |
2019-08-05 03:31:58 |
138.0.52.5 | attackbotsspam | [portscan] tcp/139 [NetBIOS Session Service] [SMB remote code execution attempt: port tcp/445] [scan/connect: 3 time(s)] *(RWIN=8192)(08041230) |
2019-08-05 03:05:43 |