City: Tainan
Region: Tainan
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.36.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41403
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.116.36.138. IN A
;; AUTHORITY SECTION:
. 528 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023051600 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 16 17:15:58 CST 2023
;; MSG SIZE rcvd: 107
Host 138.36.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 138.36.116.140.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
167.94.138.167 | attack | Fraud connect |
2025-01-22 13:53:35 |
95.214.211.63 | proxy | Karta kordim eaimdan chiqib ketgan |
2025-02-02 05:32:10 |
124.222.130.164 | normal | 领高精准预测中奖资料 |
2025-02-12 13:59:51 |
145.239.29.12 | spam | Exploit.RTF-ObfsStrm.Gen |
2025-01-23 20:00:43 |
204.76.203.71 | botsattackproxy | Botnet controller |
2025-02-03 19:41:54 |
216.131.114.163 | botsattackproxy | Brute-force attacker IP (retention 30 days) |
2025-02-06 13:46:18 |
47.128.60.184 | normal | 新加坡亚马逊 |
2025-01-23 15:19:57 |
27.25.148.95 | botsattackproxy | NTP DDoS Inbound Frequent Un-Authed MON |
2025-02-10 22:36:24 |
115.69.121.1 | attackproxy | hu |
2025-02-09 22:56:50 |
193.200.78.3 | botsattack | Malicious IP/ NTP DDoS Inbound |
2025-01-30 13:33:41 |
62.212.69.135 | botsattack | Bad IP |
2025-01-31 13:52:45 |
113.194.141.69 | normal | User IP: 192.168.10.21 Trace ID: 14836552-35b2-41f5-8019-53629952fe02 UA: Mozilla/5.0 (Linux; And |
2025-02-12 18:44:00 |
109.236.61.85 | botsattackproxy | Fraud connect |
2025-02-04 16:42:03 |
1.1.1.1 | attack | - |
2025-02-08 18:33:31 |
190.192.124.95 | spambotsproxy | Government IP |
2025-02-01 11:22:55 |