City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.218.142.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34748
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;163.218.142.57. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 20:38:30 CST 2025
;; MSG SIZE rcvd: 107
Host 57.142.218.163.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 57.142.218.163.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
172.67.179.141 | spam | Massive email spam |
2023-06-28 05:05:46 |
111.90.150.188 | attack | Xnxx.com |
2023-07-09 02:28:54 |
138.197.146.75 | attack | Scan port |
2023-07-27 12:45:30 |
212.102.33.218 | spam | ID thief, placing fake orders and using other peoples credit cards |
2023-07-18 09:51:18 |
104.152.52.95 | attack | Scan port |
2023-07-03 21:09:07 |
92.63.196.54 | attack | Scan port |
2023-07-24 12:12:20 |
218.92.0.37 | attack | ssh |
2023-07-12 23:27:14 |
92.63.196.58 | attack | Scan port |
2023-06-28 12:49:44 |
89.248.163.203 | attack | Scan port |
2023-06-26 12:53:46 |
185.225.74.158 | attack | Attacks often come from this address |
2023-07-07 22:49:59 |
90.151.171.106 | attack | Brute forse |
2023-07-25 12:25:10 |
92.63.196.54 | attack | Scan port |
2023-07-28 13:30:51 |
45.93.16.240 | attack | Scan port |
2023-08-02 12:48:29 |
113.53.40.126 | spambotsattackproxynormal | / |
2023-07-20 22:04:48 |
89.248.163.16 | attack | Scan port |
2023-06-21 12:39:58 |