City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.117.163.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59079
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.117.163.143. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021201 1800 900 604800 86400
;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 03:27:50 CST 2025
;; MSG SIZE rcvd: 108
143.163.117.121.in-addr.arpa domain name pointer i121-117-163-143.s30.a048.ap.plala.or.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
143.163.117.121.in-addr.arpa name = i121-117-163-143.s30.a048.ap.plala.or.jp.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 3.235.244.169 | attack | Hack |
2022-11-24 13:53:28 |
| 192.241.202.160 | proxy | Attack RDP |
2022-12-05 14:06:01 |
| 66.254.114.38 | attack | Scan port |
2022-11-30 13:53:45 |
| 5.188.28.188 | attack | phishing |
2022-11-25 21:15:52 |
| 92.63.196.132 | attack | Scan port hack |
2022-12-09 13:44:45 |
| 14.0.32.152 | attack | Scan port |
2022-12-08 22:29:21 |
| 66.254.114.38 | attack | Scan port |
2022-11-29 19:24:09 |
| 184.105.247.251 | proxy | Attack VPN |
2022-12-07 22:07:30 |
| 46.55.14.235 | proxy | Attack proxy |
2022-12-08 13:46:24 |
| 81.19.159.10 | attack | Scan port Hack |
2022-12-09 13:51:29 |
| 190.78.226.46 | spamattack | Ransomware attempt, EUROPOL involved |
2022-11-27 16:39:06 |
| 45.93.16.178 | attack | scan port |
2022-12-09 19:39:12 |
| 93.188.135.97 | attack | Scan port |
2022-12-08 17:32:32 |
| 216.158.238.194 | attack | Port scan |
2022-12-05 13:59:52 |
| 104.152.52.144 | attackproxy | Port scan |
2022-12-07 13:47:14 |