City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.18.56.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26487
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;149.18.56.14. IN A
;; AUTHORITY SECTION:
. 249 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022101002 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 11 19:24:34 CST 2022
;; MSG SIZE rcvd: 105
Host 14.56.18.149.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 14.56.18.149.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
87.249.132.22 | normal | Trying to login QNAP |
2022-05-29 15:56:43 |
141.101.196.233 | attackproxy | Proxy detection |
2022-05-04 15:48:10 |
139.180.190.72 | spambotsattackproxynormal | island VPN |
2022-05-30 07:59:33 |
103.74.107.14 | attack | NTP DDoS Inbound |
2022-05-25 12:36:24 |
124.249.58.85 | spambotsattackproxynormal | 555 |
2022-04-28 23:26:50 |
89.248.165.31 | attack | Port scan |
2022-05-13 12:53:03 |
87.249.132.22 | attack | Tried to bruteforce QNAP password |
2022-05-04 05:58:16 |
192.168.0.1 | attack | Key |
2022-05-06 06:58:42 |
45.93.16.216 | attack | DDoS attack |
2022-05-13 12:59:20 |
197.210.44.190 | proxy | pxoxy fraud ip |
2022-05-22 16:28:13 |
87.249.132.22 | attack | Trying to login to my QNAP NAS repeatedly |
2022-05-28 14:17:13 |
105.112.179.195 | normal | I think fairmoney app is the best |
2022-05-21 11:07:11 |
134.209.102.122 | botsattackproxynormal | A |
2022-05-21 11:19:18 |
23.172.44.109 | spambotsattackproxynormal | 代理,如VPN、SS、代理检测等。 |
2022-05-17 15:05:48 |
139.180.190.72 | spambotsattackproxynormal | name:admin |
2022-05-30 07:59:11 |