City: unknown
Region: unknown
Country: Republic of Lithuania
Internet Service Provider: Tele2
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 90.138.151.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38371
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;90.138.151.239. IN A
;; AUTHORITY SECTION:
. 590 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019101601 1800 900 604800 86400
;; Query time: 215 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 17 02:22:57 CST 2019
;; MSG SIZE rcvd: 118
239.151.138.90.in-addr.arpa domain name pointer m90-138-151-239.cust.tele2.lt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
239.151.138.90.in-addr.arpa name = m90-138-151-239.cust.tele2.lt.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 195.54.160.166 | attack | Port scan: Attack repeated for 24 hours |
2020-06-06 08:55:23 |
| 185.156.73.54 | attackspam | SmallBizIT.US 12 packets to tcp(3379,3381,3382,3389,3401,4444,5454,8585,23389,33390,33392,33393) |
2020-06-06 08:59:07 |
| 94.102.51.28 | attackbots | Scanned 333 unique addresses for 229 unique ports in 24 hours |
2020-06-06 09:05:44 |
| 80.98.249.181 | attack | Scanned 3 times in the last 24 hours on port 22 |
2020-06-06 08:37:18 |
| 185.156.73.52 | attackbots | 06/05/2020-20:34:56.564665 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-06-06 08:59:37 |
| 185.173.35.1 | attack | firewall-block, port(s): 143/tcp |
2020-06-06 08:58:15 |
| 89.248.168.112 | attackbots | firewall-block, port(s): 5555/tcp |
2020-06-06 08:34:53 |
| 59.45.27.187 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-06-06 08:42:34 |
| 195.54.160.41 | attack | ET DROP Dshield Block Listed Source group 1 - port: 53966 proto: TCP cat: Misc Attack |
2020-06-06 08:56:23 |
| 37.49.226.3 | attackbotsspam | firewall-block, port(s): 8443/tcp |
2020-06-06 08:47:54 |
| 195.54.160.30 | attackspam | Scanned 237 unique addresses for 5323 unique ports in 24 hours |
2020-06-06 08:57:07 |
| 141.98.81.138 | attack |
|
2020-06-06 09:00:59 |
| 45.141.84.40 | attackbots | Unauthorized connection attempt detected from IP address 45.141.84.40 to port 3368 |
2020-06-06 08:46:39 |
| 195.54.166.225 | attackspambots | ET DROP Dshield Block Listed Source group 1 - port: 39786 proto: TCP cat: Misc Attack |
2020-06-06 08:52:11 |
| 192.129.121.45 | attackbots | Honeypot attack, port: 81, PTR: PTR record not found |
2020-06-06 08:57:56 |