City: unknown
Region: unknown
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: NexG Co., LTD
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.136.160.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12945
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;112.136.160.64. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019072501 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 26 01:55:38 CST 2019
;; MSG SIZE rcvd: 118
64.160.136.112.in-addr.arpa domain name pointer static.112-136-160-64.nexg.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
64.160.136.112.in-addr.arpa name = static.112-136-160-64.nexg.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 47.96.184.208 | attack | NTP DDoS Inbound |
2023-03-07 13:56:43 |
| 2001:0002:14:5:1:23:bf35:2610 | spambotsattack | Fall |
2023-03-09 15:25:58 |
| 103.165.192.202 | normal | mempool.space |
2023-03-16 08:39:00 |
| 162.243.140.31 | proxy | VPN fraud |
2023-03-06 14:00:29 |
| 217.20.152.226 | attack | Scan port |
2023-02-28 22:44:58 |
| 196.188.31.17 | attack | Scan port |
2023-03-16 13:46:58 |
| 185.224.128.232 | attack | Scan port |
2023-02-27 13:44:17 |
| 192.241.207.100 | proxy | VPN fraud |
2023-03-06 13:51:49 |
| 162.243.133.18 | proxy | VPN fraud |
2023-03-02 13:53:25 |
| 194.195.124.12 | spambotsattackproxynormal | HAK MY FILL |
2023-03-14 01:57:19 |
| 165.154.10.144 | proxy | VPN f |
2023-03-06 13:58:09 |
| 109.200.162.252 | spambotsattackproxynormal | Cc |
2023-03-08 08:51:28 |
| 92.63.196.69 | attack | Scan port |
2023-03-15 13:43:32 |
| 184.105.247.244 | proxy | VPN fraud |
2023-03-16 13:54:06 |
| 147.78.47.189 | attack | Scan port |
2023-03-03 13:52:57 |