City: Valby
Region: Capital Region
Country: Denmark
Internet Service Provider: Telenor
Hostname: unknown
Organization: Telenor A/S
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.83.3.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16688
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;85.83.3.222. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019082600 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 27 00:39:04 CST 2019
;; MSG SIZE rcvd: 115
222.3.83.85.in-addr.arpa domain name pointer 085083003222.dynamic.telenor.dk.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
222.3.83.85.in-addr.arpa name = 085083003222.dynamic.telenor.dk.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.175.93.11 | attackspam | 04/23/2020-07:05:13.863528 185.175.93.11 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-04-23 19:51:28 |
| 87.251.74.59 | attack | Port scan on 8 port(s): 1123 1457 1467 1481 1521 1617 1782 1801 |
2020-04-23 20:09:22 |
| 45.227.254.30 | attack | Apr 23 12:43:44 debian-2gb-nbg1-2 kernel: \[9897574.133460\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.227.254.30 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=1343 PROTO=TCP SPT=50168 DPT=9006 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-04-23 19:33:44 |
| 124.205.140.186 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-23 19:58:06 |
| 185.202.1.155 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 10000 proto: TCP cat: Misc Attack |
2020-04-23 19:45:49 |
| 94.177.232.23 | attackspam | Invalid user ae from 94.177.232.23 port 48016 |
2020-04-23 19:59:49 |
| 92.63.194.3 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 10000 proto: TCP cat: Misc Attack |
2020-04-23 20:05:03 |
| 185.202.1.153 | attack | ET DROP Dshield Block Listed Source group 1 - port: 10000 proto: TCP cat: Misc Attack |
2020-04-23 19:46:54 |
| 185.36.81.20 | attack | ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-04-23 19:54:20 |
| 218.16.120.12 | attack | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-23 19:41:54 |
| 23.94.27.3 | attackspambots | (From claudiauclement@yahoo.com) Hi, We are wondering if you would be interested in our service, where we can provide you with a dofollow link from Amazon (DA 96) back to mathesfamilychiropractic.com? The price is just $67 per link, via Paypal. To explain what DA is and the benefit for your website, along with a sample of an existing link, please read here: https://justpaste.it/6jp87 If you'd be interested in learning more, reply to this email but please make sure you include the word INTERESTED in the subject line field, so we can get to your reply sooner. Kind Regards, Claudia |
2020-04-23 19:39:59 |
| 125.46.23.166 | attackbotsspam | Unauthorized connection attempt detected from IP address 125.46.23.166 to port 1433 [T] |
2020-04-23 19:57:42 |
| 185.156.73.45 | attack | firewall-block, port(s): 8222/tcp, 8390/tcp |
2020-04-23 19:53:41 |
| 92.63.194.102 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 10000 proto: TCP cat: Misc Attack |
2020-04-23 20:02:14 |
| 185.175.93.14 | attackspambots | Apr 23 13:41:15 debian-2gb-nbg1-2 kernel: \[9901024.524728\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.14 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=20596 PROTO=TCP SPT=53743 DPT=9099 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-04-23 19:51:04 |