City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.229.159.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15368
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;169.229.159.84. IN A
;; AUTHORITY SECTION:
. 514 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022062501 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 26 10:59:05 CST 2022
;; MSG SIZE rcvd: 107
84.159.229.169.in-addr.arpa domain name pointer darlot.berkeley.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
84.159.229.169.in-addr.arpa name = darlot.berkeley.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
45.33.46.249 | proxy | VPN |
2023-02-07 22:54:16 |
64.62.197.192 | proxy | VPN |
2023-01-30 14:02:04 |
66.240.236.119 | proxy | VPN detect |
2023-01-30 14:00:34 |
107.170.228.24 | proxy | VPN |
2023-01-23 14:07:33 |
10.0.0.1 | spambotsattackproxynormal | 2020 |
2023-02-08 13:50:48 |
212.56.195.165 | attack | Port scan |
2023-01-25 13:52:48 |
192.168.1.1 | spambotsattackproxynormal | 1234 |
2023-02-08 13:34:14 |
104.156.155.31 | botsattack | Multiple attempts of intrusion into local server |
2023-02-06 01:26:50 |
152.32.140.237 | proxy | VPN |
2023-01-30 14:11:43 |
66.254.114.38 | attack | Port scan |
2023-02-02 13:51:43 |
217.20.156.72 | attack | Port scan |
2023-02-06 13:51:50 |
89.248.165.77 | attack | Port scan |
2023-02-01 13:48:37 |
79.124.59.74 | attack | Port scan |
2023-02-01 20:05:54 |
116.58.207.190 | spambotsattackproxynormal | Hjaj |
2023-02-02 16:24:16 |
192.241.225.17 | proxy | VPN |
2023-01-25 13:56:39 |