City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.107.2.171
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41129
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.107.2.171. IN A
;; AUTHORITY SECTION:
. 347 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:19:00 CST 2022
;; MSG SIZE rcvd: 106
171.2.107.104.in-addr.arpa domain name pointer a104-107-2-171.deploy.static.akamaitechnologies.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
171.2.107.104.in-addr.arpa name = a104-107-2-171.deploy.static.akamaitechnologies.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
2001:DB8:0:0:8:800:200C:417A | proxy | 2001:DB8:0:0:8:800:200C:417A |
2023-09-07 18:14:05 |
61.131.30.180 | normal | 学校ip |
2023-09-08 16:25:08 |
104.152.52.237 | attack | Scan port |
2023-09-07 12:34:09 |
34.117.59.81 | spam | Possible External IP Lookup Domain |
2023-09-15 12:55:32 |
212.64.217.150 | attack | Scan port |
2023-09-13 12:40:14 |
79.137.192.29 | botsattack | DDoS |
2023-09-12 12:27:55 |
199.195.252.122 | attack | Scan port |
2023-09-13 12:25:59 |
217.66.156.224 | attack | 2023-09-12 14:15:49 | |
172.67.24.133 | spam | Spammer IP Address |
2023-09-18 06:06:19 |
198.23.200.242 | botsattackproxy | Scan port |
2023-09-06 12:41:29 |
141.98.6.202 | spamattack | Exploited host |
2023-09-14 18:40:26 |
193.35.18.27 | attack | attack from minitool program, after install this make varius attacks with various ips and ports |
2023-09-18 06:45:00 |
152.89.198.51 | botsattackproxy | Scan port 24 hours |
2023-09-06 12:48:39 |
35.201.77.50 | attack | Scan port |
2023-09-08 12:36:01 |
185.224.128.193 | attack | Scan port |
2023-09-11 12:27:39 |