City: Omihachiman
Region: Shiga
Country: Japan
Internet Service Provider: SoftBank
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.207.222.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37364
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;126.207.222.222. IN A
;; AUTHORITY SECTION:
. 452 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020051401 1800 900 604800 86400
;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 06:01:48 CST 2020
;; MSG SIZE rcvd: 119
222.222.207.126.in-addr.arpa domain name pointer softbank126207222222.bbtec.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
222.222.207.126.in-addr.arpa name = softbank126207222222.bbtec.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
173.249.66.74 | attackspambots | Port Scan: UDP/137 |
2019-09-20 19:35:37 |
31.156.227.138 | attack | Port Scan: TCP/88 |
2019-09-20 19:56:58 |
119.198.239.146 | attackspambots | Port Scan: TCP/8000 |
2019-09-20 19:38:17 |
198.46.125.66 | attackspambots | Port Scan: UDP/137 |
2019-09-20 20:03:34 |
115.207.41.42 | attackspam | Port Scan: TCP/23 |
2019-09-20 19:39:55 |
117.44.164.253 | attackbotsspam | Port Scan: TCP/21 |
2019-09-20 19:38:55 |
3.130.230.151 | attackbots | Port Scan: TCP/6379 |
2019-09-20 19:58:11 |
60.191.117.62 | attackbots | Port Scan: UDP/49153 |
2019-09-20 19:53:41 |
175.6.143.52 | attackbotsspam | Port Scan: TCP/8080 |
2019-09-20 20:11:10 |
79.106.20.207 | attackbotsspam | Port Scan: TCP/8081 |
2019-09-20 19:48:40 |
71.59.20.203 | attackspam | Port Scan: UDP/11111 |
2019-09-20 19:50:28 |
119.55.151.217 | attackspambots | Port Scan: TCP/8080 |
2019-09-20 19:38:32 |
112.215.244.62 | attackbotsspam | Port Scan: TCP/445 |
2019-09-20 19:41:43 |
111.252.69.133 | attackspambots | Port Scan: TCP/2323 |
2019-09-20 19:42:29 |
31.28.248.164 | attack | Port Scan: TCP/443 |
2019-09-20 19:57:31 |