City: unknown
Region: unknown
Country: Singapore
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.251.249.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37057
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.251.249.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 21:41:30 CST 2025
;; MSG SIZE rcvd: 107
142.249.251.13.in-addr.arpa domain name pointer ec2-13-251-249-142.ap-southeast-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.249.251.13.in-addr.arpa name = ec2-13-251-249-142.ap-southeast-1.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
113.110.245.179 | attackspam | 49152/tcp 49152/tcp 49152/tcp... [2020-10-02]4pkt,1pt.(tcp) |
2020-10-04 00:03:31 |
89.160.186.180 | attackspam | 55101/udp [2020-10-02]1pkt |
2020-10-04 00:08:57 |
205.250.77.134 | attackbotsspam | Icarus honeypot on github |
2020-10-04 00:01:18 |
193.124.59.213 | attackspam | Oct 3 07:00:06 *** sshd[25566]: Did not receive identification string from 193.124.59.213 |
2020-10-04 00:14:43 |
183.105.162.106 | attack | 23/tcp [2020-10-02]1pkt |
2020-10-04 00:11:29 |
128.199.77.88 | attack | 128.199.77.88 - - - [02/Oct/2020:22:38:46 +0200] "GET /.env HTTP/1.1" 404 564 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36" "-" "-" |
2020-10-03 23:39:42 |
207.154.229.50 | attackspam | Invalid user dc from 207.154.229.50 port 54338 |
2020-10-03 23:37:16 |
146.185.25.188 | attackspambots | Blocked by Sophos UTM Network Protection . / / proto=6 . srcport=3780 . dstport=3780 . (1511) |
2020-10-03 23:43:01 |
219.157.207.221 | attackbotsspam | 8443/tcp 8443/tcp 8443/tcp [2020-10-02]3pkt |
2020-10-03 23:59:10 |
189.190.32.7 | attack | SSH/22 MH Probe, BF, Hack - |
2020-10-03 23:46:23 |
179.127.175.154 | attackspambots | 445/tcp [2020-10-02]1pkt |
2020-10-04 00:20:04 |
194.170.156.9 | attackspam | $f2bV_matches |
2020-10-04 00:16:53 |
124.81.84.130 | attack | 1433/tcp 445/tcp... [2020-08-28/10-02]6pkt,2pt.(tcp) |
2020-10-03 23:32:59 |
176.31.255.63 | attackspam | Invalid user usuario2 from 176.31.255.63 port 53056 |
2020-10-03 23:37:35 |
58.118.205.199 | attack | 1433/tcp 1433/tcp [2020-09-26/10-02]2pkt |
2020-10-03 23:49:32 |