City: unknown
Region: unknown
Country: South Africa
Internet Service Provider: Telkom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.149.2.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14552
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;165.149.2.126. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 22:43:04 CST 2025
;; MSG SIZE rcvd: 106
Host 126.2.149.165.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 126.2.149.165.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 124.222.130.164 | normal | 领高精准预测中奖资料 |
2025-02-12 13:58:12 |
| 141.98.11.35 | botsattackproxy | Vulnerability Scanner |
2025-01-23 13:58:46 |
| 172.64.135.14 | spambotsattackproxynormal | 172.64.135.14 |
2025-01-26 13:43:36 |
| 173.249.19.124 | attack | Attack, like DDOS, Brute-Force, Port Scan, Hack, etc. |
2025-02-04 15:23:45 |
| 205.210.31.35 | botsattackproxy | Vulnerability Scanner |
2025-01-24 13:57:55 |
| 43.135.86.121 | botsattackproxy | Scaner boot |
2025-01-21 13:43:50 |
| 216.131.114.163 | botsattackproxy | Brute-force attacker IP (retention 30 days) |
2025-02-06 13:46:18 |
| 192.168.10.39 | attacknormal | CNCC-LDKv |
2025-02-04 11:03:59 |
| 85.192.193.111 | spambotsattackproxynormal | IP |
2025-02-08 18:30:32 |
| 79.124.62.134 | spamattackproxy | 79.124.62.134 |
2025-01-29 23:06:54 |
| 124.222.130.164 | normal | 领高精准预测中奖资料 |
2025-02-12 13:59:51 |
| 115.69.121.1 | attackproxy | hu |
2025-02-09 22:56:50 |
| 115.69.121.1 | attackproxy | hu |
2025-02-09 22:56:59 |
| 95.182.104.156 | attack | Kazajistan, android |
2025-01-27 14:52:18 |
| 158.46.147.181 | spam | email spoof |
2025-01-26 22:27:14 |