City: unknown
Region: unknown
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.45.228.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58156
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.45.228.104. IN A
;; AUTHORITY SECTION:
. 120 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:04:12 CST 2022
;; MSG SIZE rcvd: 107
104.228.45.139.in-addr.arpa is an alias for 104.96_27.228.45.139.in-addr.arpa.
104.96_27.228.45.139.in-addr.arpa domain name pointer node31.mt.viaprog.eu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
104.228.45.139.in-addr.arpa canonical name = 104.96_27.228.45.139.in-addr.arpa.
104.96_27.228.45.139.in-addr.arpa name = node31.mt.viaprog.eu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
149.154.167.43 | attack | Scan port |
2024-02-22 16:29:12 |
104.152.52.132 | attack | Port scan |
2024-02-25 19:08:16 |
118.193.64.186 | botsattack | hack |
2024-02-27 14:18:29 |
102.165.16.31 | attack | Hacking |
2024-02-28 13:29:58 |
149.154.167.223 | attack | Scan port |
2024-02-20 21:21:53 |
190.136.220.45 | attackproxy | port attack |
2024-03-05 13:49:46 |
162.62.209.135 | attack | hacking |
2024-02-21 13:57:54 |
185.180.143.16 | botsattack | hack |
2024-02-29 22:37:17 |
185.46.50.62 | botsattack | Hack |
2024-02-29 13:34:44 |
87.236.176.143 | attackproxy | port attack |
2024-03-05 14:00:28 |
198.199.101.120 | attackproxy | hacking |
2024-02-20 13:48:03 |
111.109.3.221 | spam | porn Thank you for the good writeup. It in fact was a amusement account it. Look advanced to far added agreeable from you! However, how can we communicate? |
2024-02-29 04:31:06 |
87.236.176.112 | attackproxy | port attack |
2024-03-05 13:58:44 |
176.96.138.94 | attack | Scan port |
2024-02-19 13:50:35 |
80.66.88.204 | botsattack | hacking |
2024-02-29 13:27:59 |