City: unknown
Region: unknown
Country: Czech Republic
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.99.106.247
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;93.99.106.247. IN A
;; AUTHORITY SECTION:
. 151 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 12:57:59 CST 2022
;; MSG SIZE rcvd: 106
247.106.99.93.in-addr.arpa domain name pointer 247.106.99.93.finalhosting.cz.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
247.106.99.93.in-addr.arpa name = 247.106.99.93.finalhosting.cz.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
92.118.37.97 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 83 - port: 7785 proto: TCP cat: Misc Attack |
2020-05-03 06:46:01 |
104.244.78.213 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 100 - port: 389 proto: TCP cat: Misc Attack |
2020-05-03 06:39:22 |
185.175.93.17 | attack | ET DROP Dshield Block Listed Source group 1 - port: 4206 proto: TCP cat: Misc Attack |
2020-05-03 06:32:40 |
104.248.187.165 | attackspam | 2020-05-02 11:34:46 server sshd[52630]: Failed password for invalid user root from 104.248.187.165 port 58872 ssh2 |
2020-05-03 06:38:48 |
84.38.184.53 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 71 - port: 2440 proto: TCP cat: Misc Attack |
2020-05-03 06:52:14 |
185.153.198.211 | attackbotsspam | ET DROP Dshield Block Listed Source group 1 - port: 33399 proto: TCP cat: Misc Attack |
2020-05-03 06:33:25 |
80.82.64.146 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 65 - port: 5900 proto: TCP cat: Misc Attack |
2020-05-03 06:54:15 |
87.251.74.249 | attackspam | Multiport scan : 29 ports scanned 2019 2043 2046 2093 2135 2145 2200 2249 2270 2367 2439 2468 2555 2577 2586 2607 2618 2642 2644 2780 2799 2810 2818 2870 2908 2932 2955 2961 2983 |
2020-05-03 06:50:23 |
106.13.68.209 | attack | May 2 21:34:07 ms-srv sshd[16373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.68.209 May 2 21:34:09 ms-srv sshd[16373]: Failed password for invalid user varsha from 106.13.68.209 port 38330 ssh2 |
2020-05-03 06:38:31 |
87.251.75.254 | attackspam | ET SCAN MS Terminal Server Traffic on Non-standard Port - port: 80 proto: TCP cat: Attempted Information Leak |
2020-05-03 06:49:54 |
87.251.74.201 | attack | Multiport scan : 33 ports scanned 50 101 111 404 808 900 3381 3392 3397 4433 4444 5005 6666 8899 10001 11111 15000 20002 21000 23000 23389 26000 27000 30000 30003 33333 33382 33390 33391 33890 33893 43389 55555 |
2020-05-03 06:51:28 |
92.53.65.52 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 84 - port: 2996 proto: TCP cat: Misc Attack |
2020-05-03 06:47:35 |
68.183.85.116 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 55 - port: 9237 proto: TCP cat: Misc Attack |
2020-05-03 06:55:10 |
182.74.5.75 | attackbotsspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2020-05-03 06:35:40 |
64.225.114.132 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 51 - port: 787 proto: TCP cat: Misc Attack |
2020-05-03 06:56:29 |