City: Alcúdia
Region: Comunidad Autónoma de las Islas Baleares
Country: Spain
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 88.2.139.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11351
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;88.2.139.252. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030700 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 18:26:32 CST 2025
;; MSG SIZE rcvd: 105
252.139.2.88.in-addr.arpa domain name pointer 252.red-88-2-139.staticip.rima-tde.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
252.139.2.88.in-addr.arpa name = 252.red-88-2-139.staticip.rima-tde.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
180.66.207.67 | attack | Apr 23 14:29:02 vpn01 sshd[32385]: Failed password for root from 180.66.207.67 port 37088 ssh2 Apr 23 14:33:08 vpn01 sshd[32444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.66.207.67 ... |
2020-04-23 21:12:12 |
112.163.187.88 | attack | [portscan] tcp/23 [TELNET] *(RWIN=57553)(04231254) |
2020-04-23 21:07:35 |
192.241.231.79 | attackspam | Unauthorized connection attempt from IP address 192.241.231.79 on Port 3389(RDP) |
2020-04-23 20:52:34 |
54.223.61.142 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-04-23 20:41:53 |
74.135.174.229 | attack | WEB_SERVER 403 Forbidden |
2020-04-23 20:54:06 |
123.185.181.197 | attackspam | Unauthorized connection attempt from IP address 123.185.181.197 on Port 445(SMB) |
2020-04-23 21:00:25 |
68.183.55.223 | attackspambots | 19541/tcp 593/tcp 26472/tcp... [2020-04-12/23]36pkt,12pt.(tcp) |
2020-04-23 20:41:26 |
92.119.160.145 | attackspam | [Mon Apr 20 16:58:40 2020] - DDoS Attack From IP: 92.119.160.145 Port: 57210 |
2020-04-23 20:34:48 |
36.75.143.159 | attackbots | Unauthorized connection attempt from IP address 36.75.143.159 on Port 445(SMB) |
2020-04-23 20:50:01 |
142.93.182.7 | attackspambots | WordPress login Brute force / Web App Attack on client site. |
2020-04-23 21:09:47 |
117.5.96.26 | attackspam | Unauthorized connection attempt from IP address 117.5.96.26 on Port 445(SMB) |
2020-04-23 21:13:24 |
80.82.64.73 | attackbotsspam | Fail2Ban Ban Triggered |
2020-04-23 20:40:14 |
107.172.90.18 | attackspam | Invalid user ftpuser from 107.172.90.18 port 43040 |
2020-04-23 21:11:55 |
45.13.93.90 | attack | Unauthorized connection attempt detected from IP address 45.13.93.90 to port 7777 |
2020-04-23 20:45:20 |
106.54.234.21 | attackbotsspam | Bruteforce detected by fail2ban |
2020-04-23 21:10:10 |