City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.169.159.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40736
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;122.169.159.54. IN A
;; AUTHORITY SECTION:
. 300 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400
;; Query time: 180 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 02:09:57 CST 2022
;; MSG SIZE rcvd: 107
54.159.169.122.in-addr.arpa domain name pointer abts-ap-dynamic-054.159.169.122.airtelbroadband.in.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
54.159.169.122.in-addr.arpa name = abts-ap-dynamic-054.159.169.122.airtelbroadband.in.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
0.53.249.191 | attack | ssh attacks |
2020-12-24 01:56:46 |
189.231.174.186 | attack | Servicio pesimo y lento |
2020-12-22 12:57:16 |
65.74.237.2 | normal | De donde proviene |
2020-12-14 06:43:49 |
185.63.153.200 | proxy | Bokep |
2020-12-22 06:27:53 |
185.63.253.200 | spambotsattack | Bokep fim |
2020-12-17 21:23:51 |
96.44.109.14 | attack | They hacked me |
2020-12-14 17:58:55 |
185.63.153.200 | botsproxynormal | Bokep |
2020-12-22 06:28:12 |
107.158.49.5 | attack | PHISHING ATTACK "Want to Win up to $1,500 for Groceries?, from OpinionRewards@smartpad.today, Received from helo=paso.smartpad.today " |
2020-12-13 08:36:37 |
51.222.25.207 | attackproxy | Fake ip getting out out there. |
2020-12-21 12:44:24 |
185.63.253.205 | spambotsattackproxynormal | Bokep jepang |
2020-12-25 10:11:31 |
187.137.59.98 | spambotsattackproxynormal | Por q me sale esta ip i en el router sale otra ip? |
2020-12-17 09:15:42 |
10.171.190.60 | attack | PHISHING ATTACK "following our quick chat - here's the nodeposit" |
2020-12-13 05:48:29 |
8.44.63.7 | spambots | Spammmmmmma lol |
2020-12-20 04:34:01 |
164.68.127.25 | proxy | Xnxx.com |
2020-12-18 17:40:11 |
91.228.167.19 | attacknormal | inetnum: 80.150.168.0 - 80.150.171.255 netname: DTAG-TRANSIT14 descr: Deutsche Telekom AG descr: for IP-Transit org: ORG-DTAG1-RIPE country: DE admin-c: DTIP tech-c: DTST status: ASSIGNED PA remarks: INFRA-AW mnt-by: DTAG-NIC created: 2010-12-09T12:27:25Z last-modified: 2014-06-19T08:59:54Z source: RIPE organisation: ORG-DTAG1-RIPE org-name: Deutsche Telekom AG org-type: OTHER address: Group Information Security, SDA/Abuse address: T-Online-Allee 1 address: DE 64295 Darmstadt remarks: abuse contact in case of Spam, hack attacks, illegal activity, violation, scans, probes, etc. |
2020-12-18 16:19:34 |