City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.18.204.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64511
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;133.18.204.14. IN A
;; AUTHORITY SECTION:
. 262 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:44:43 CST 2022
;; MSG SIZE rcvd: 106
14.204.18.133.in-addr.arpa domain name pointer v133-18-204-14.vir.kagoya.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.204.18.133.in-addr.arpa name = v133-18-204-14.vir.kagoya.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 176.211.181.66 | attack | DDoS |
2025-06-05 12:59:24 |
| 46.159.129.104 | botsattackproxy | DDoS |
2025-06-16 12:56:20 |
| 172.104.11.34 | spambotsattack | Postfix attacker IP |
2025-06-13 12:50:14 |
| 52.29.46.199 | attack | DDos |
2025-06-13 16:05:31 |
| 172.236.228.229 | spambotsattackproxy | SSH bot |
2025-06-05 12:52:35 |
| 79.124.62.6 | botsattackproxy | Vulnerability Scanner |
2025-06-02 13:00:15 |
| 143.110.255.28 | attack | Ok |
2025-05-01 07:25:15 |
| 198.235.24.55 | spamattack | VoIP blacklist IP |
2025-06-20 12:44:49 |
| 205.210.31.152 | botsattackproxy | Vulnerability Scanner |
2025-06-10 14:52:40 |
| 194.195.208.25 | spamattack | Exploited |
2025-06-05 13:01:10 |
| 87.236.176.162 | spamattack | SSH bot |
2025-06-04 13:00:35 |
| 185.196.10.54 | spamattack | Android malware Hook |
2025-06-13 20:05:39 |
| 87.236.176.103 | botsattackproxy | Apache attacker IP |
2025-06-09 21:16:23 |
| 64.62.197.232 | botsattack | Vulnerability Scanner |
2025-06-06 14:46:23 |
| 1.14.205.233 | attackproxy | f29-08873 |
2025-05-27 21:29:32 |