City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.126.21.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;141.126.21.47. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 23:31:43 CST 2025
;; MSG SIZE rcvd: 106
47.21.126.141.in-addr.arpa domain name pointer syn-141-126-021-047.res.spectrum.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
47.21.126.141.in-addr.arpa name = syn-141-126-021-047.res.spectrum.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
192.241.220.251 | attackspambots | " " |
2020-03-08 02:56:40 |
95.56.7.5 | attack | Email rejected due to spam filtering |
2020-03-08 02:47:40 |
194.26.29.14 | attackbots | Mar 7 19:19:53 debian-2gb-nbg1-2 kernel: \[5864353.153284\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.14 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=12794 PROTO=TCP SPT=40019 DPT=3681 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-03-08 03:16:45 |
51.178.29.39 | attackspambots | Invalid user jocelyn from 51.178.29.39 port 55600 |
2020-03-08 03:17:58 |
185.220.101.14 | attack | $f2bV_matches |
2020-03-08 03:07:04 |
87.65.53.26 | attack | Honeypot attack, port: 4567, PTR: 26.53-65-87.adsl-dyn.isp.belgacom.be. |
2020-03-08 03:11:11 |
72.214.101.2 | attackbots | IP: 72.214.101.2 Ports affected World Wide Web HTTP (80) Abuse Confidence rating 20% ASN Details AS22898 ATLINK United States (US) CIDR 72.214.96.0/21 Log Date: 7/03/2020 12:36:00 PM UTC |
2020-03-08 03:13:12 |
205.185.114.216 | attackbotsspam | 8082/tcp 20000/tcp 9090/tcp... [2020-03-07]29pkt,29pt.(tcp) |
2020-03-08 02:55:39 |
123.18.78.112 | attack | Spammer_1 |
2020-03-08 03:21:47 |
170.106.81.36 | attackbots | firewall-block, port(s): 8388/tcp |
2020-03-08 03:02:13 |
87.117.216.231 | attackbotsspam | SpamScore above: 10.0 |
2020-03-08 03:10:54 |
58.164.12.14 | attackspam | firewall-block, port(s): 8000/tcp |
2020-03-08 03:22:37 |
193.32.161.60 | attackspambots | Port scan: Attack repeated for 24 hours |
2020-03-08 02:53:08 |
182.184.108.221 | attack | Honeypot attack, port: 81, PTR: PTR record not found |
2020-03-08 03:24:16 |
85.96.174.221 | attack | Honeypot attack, port: 81, PTR: 85.96.174.221.dynamic.ttnet.com.tr. |
2020-03-08 03:14:39 |