City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.225.229.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38386
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.225.229.242. IN A
;; AUTHORITY SECTION:
. 381 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 20:13:39 CST 2022
;; MSG SIZE rcvd: 108
Host 242.229.225.121.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 242.229.225.121.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 41.65.236.48 | normal | Wifi password |
2022-11-15 01:23:24 |
| 45.95.147.48 | attack | Multiport scan |
2022-11-03 13:49:34 |
| 89.248.163.214 | attack | multiple scan port |
2022-11-07 13:49:39 |
| 92.45.248.60 | normal | 2045 |
2022-11-05 05:40:01 |
| 212.0.195.16 | attack | Scan port |
2022-11-23 22:16:40 |
| 45.134.144.101 | attack | Scan port |
2022-11-07 13:47:19 |
| 45.144.36.243 | spambots | HACKED TELEGRAMM ACCOUNT |
2022-11-23 03:07:55 |
| 146.88.240.4 | attackproxy | first L2TP UDP packet received from 146.88.240.4 |
2022-11-10 14:32:40 |
| 162.62.120.175 | attack | Brute-forse |
2022-11-08 22:48:46 |
| 190.2.139.23 | spam | Trojan.Cryxos.9968 |
2022-11-03 14:01:54 |
| 205.185.120.31 | botsattackproxy | 代理,攻击服务器 |
2022-11-06 15:04:14 |
| 89.248.163.241 | attack | DdoS attack |
2022-11-08 13:38:17 |
| 89.248.165.35 | attack | PORT SCAN |
2022-11-14 13:55:11 |
| 45.56.96.139 | attack | ATTACKS ON 443 WEB ROUTER PANEL |
2022-11-21 22:27:15 |
| 104.131.82.44 | attack | Scan port |
2022-11-16 13:46:34 |