City: unknown
Region: unknown
Country: United States
Internet Service Provider: Verizon
Hostname: unknown
Organization: Cellco Partnership DBA Verizon Wireless
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 97.40.68.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46346
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;97.40.68.61. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019062500 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 26 00:21:01 CST 2019
;; MSG SIZE rcvd: 115
61.68.40.97.in-addr.arpa domain name pointer 61.sub-97-40-68.myvzw.com.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
61.68.40.97.in-addr.arpa name = 61.sub-97-40-68.myvzw.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 198.108.67.59 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 08:54:59 |
| 196.52.43.65 | attack | Trying ports that it shouldn't be. |
2020-02-21 09:07:19 |
| 198.108.67.99 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 08:51:57 |
| 195.246.57.116 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 09:09:22 |
| 196.201.244.60 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 09:05:41 |
| 198.108.66.110 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 08:58:25 |
| 198.20.99.130 | attackbotsspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 08:59:32 |
| 196.28.101.137 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 09:08:41 |
| 194.55.132.250 | attackbotsspam | ET SCAN Sipvicious Scan - port: 5060 proto: UDP cat: Attempted Information Leak |
2020-02-21 09:13:46 |
| 200.9.200.249 | attackbots | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 08:48:32 |
| 197.164.98.67 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 09:01:56 |
| 192.241.239.25 | attack | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 09:18:59 |
| 196.52.43.54 | attack | Unauthorized connection attempt detected from IP address 196.52.43.54 to port 8081 |
2020-02-21 09:07:46 |
| 198.108.66.149 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2020-02-21 08:58:13 |
| 198.108.67.52 | attack | 02/20/2020-19:31:03.059733 198.108.67.52 Protocol: 6 ET DROP Dshield Block Listed Source group 1 |
2020-02-21 08:55:38 |