City: unknown
Region: unknown
Country: United States
Internet Service Provider: Verizon
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 97.214.31.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61179
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;97.214.31.201. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019091000 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Sep 11 00:49:43 CST 2019
;; MSG SIZE rcvd: 117
201.31.214.97.in-addr.arpa domain name pointer 201.sub-97-214-31.myvzw.com.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
201.31.214.97.in-addr.arpa name = 201.sub-97-214-31.myvzw.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 112.175.124.47 | attackbots | ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak |
2019-10-26 07:24:57 |
| 187.211.76.144 | attackspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic |
2019-10-26 07:16:59 |
| 31.184.215.236 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 16 - port: 43380 proto: TCP cat: Misc Attack |
2019-10-26 07:13:07 |
| 185.209.0.92 | attackbotsspam | 10/25/2019-23:28:50.611063 185.209.0.92 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2019-10-26 07:41:30 |
| 185.156.73.3 | attackbotsspam | 20119/tcp 20120/tcp 20121/tcp... [2019-10-17/25]756pkt,213pt.(tcp) |
2019-10-26 07:47:04 |
| 185.156.73.27 | attackbotsspam | firewall-block, port(s): 21972/tcp, 39097/tcp, 39099/tcp, 53035/tcp, 53036/tcp, 53037/tcp |
2019-10-26 07:45:33 |
| 185.156.73.42 | attackspam | Automatic report - Port Scan |
2019-10-26 07:44:04 |
| 185.175.93.22 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 3339 proto: TCP cat: Misc Attack |
2019-10-26 07:19:33 |
| 185.246.128.26 | attackspambots | ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak |
2019-10-26 07:17:28 |
| 104.206.128.46 | attackspambots | ET SCAN Suspicious inbound to PostgreSQL port 5432 - port: 5432 proto: TCP cat: Potentially Bad Traffic |
2019-10-26 07:26:37 |
| 185.156.73.25 | attackbotsspam | firewall-block, port(s): 26314/tcp, 26315/tcp, 26316/tcp, 51379/tcp, 51380/tcp, 51381/tcp, 57592/tcp |
2019-10-26 07:46:00 |
| 198.108.67.105 | attackbots | ET DROP Dshield Block Listed Source group 1 - port: 9110 proto: TCP cat: Misc Attack |
2019-10-26 07:15:31 |
| 90.150.199.106 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 87 - port: 23 proto: TCP cat: Misc Attack |
2019-10-26 07:30:05 |
| 112.175.120.177 | attackspambots | ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak |
2019-10-26 07:25:41 |
| 195.154.32.212 | attackbotsspam | ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak |
2019-10-26 07:16:44 |