City: unknown
Region: Georgia
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.142.82.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.142.82.148. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062701 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 08:32:45 CST 2025
;; MSG SIZE rcvd: 107
Host 148.82.142.107.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 148.82.142.107.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
102.185.37.243 | spambotsattackproxynormal | اريد الوصول |
2025-03-14 17:54:58 |
188.92.77.235 | botsattackproxy | SSH Bot Scanner |
2025-02-05 13:59:30 |
125.160.229.65 | spambotsproxy | spam nggak jelas |
2025-03-08 10:45:51 |
2001:0002:14:5:1:2:bf35:2610 | spambotsattackproxynormal | 2001:0002:14:5:1:2:bf35:2610 |
2025-03-07 17:59:13 |
85.9.20.136 | botsattackproxy | Compromised IP |
2025-02-07 21:27:27 |
125.160.229.65 | spam | spam nggak jelas |
2025-03-08 10:45:11 |
79.170.40.182 | spam | [INSERT CITATION NAP HERE] This Text Will Make Your Eyebrow Tattoo Natural Amazing: Read Or Miss Out [Insert Secondaru anchor text spintax]] I'm not sure exactly why but this website is loading extremely slow for me. Is anyone else having this problem or is it a issue on my end? I'll check back later on and see if the problem still exists. |
2025-03-06 23:00:56 |
64.62.197.131 | botsattackproxy | Vulnerability Scanner |
2025-02-05 16:49:33 |
115.69.121.1 | attackproxy | hu |
2025-02-09 22:56:59 |
180.251.227.198 | spambotsattack | hack my account |
2025-03-04 22:49:54 |
216.131.114.163 | botsattackproxy | Brute-force attacker IP (retention 30 days) |
2025-02-06 13:46:18 |
193.68.89.52 | botsattackproxy | Fraud connect |
2025-02-12 22:15:32 |
115.69.121.1 | attackproxy | hu |
2025-02-09 22:56:50 |
125.165.154.20 | spambotsattackproxynormal | 125.165.154.20 |
2025-03-18 10:26:46 |
fe80::227:15ff:fe68:5069 | spamnormal | fe80::227:15ff:fe68:5069 |
2025-03-18 11:11:47 |