City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.164.48.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29633
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;18.164.48.21. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 18:52:40 CST 2025
;; MSG SIZE rcvd: 105
21.48.164.18.in-addr.arpa domain name pointer server-18-164-48-21.cdg50.r.cloudfront.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
21.48.164.18.in-addr.arpa name = server-18-164-48-21.cdg50.r.cloudfront.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
202.120.171.6 | attackspambots | $f2bV_matches |
2020-02-11 04:29:08 |
45.83.67.175 | attackbots | scan z |
2020-02-11 04:03:03 |
79.101.58.63 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-11 04:32:29 |
47.225.136.229 | attack | Honeypot attack, port: 81, PTR: 047-225-136-229.res.spectrum.com. |
2020-02-11 04:02:28 |
182.64.214.77 | attack | 1581341848 - 02/10/2020 14:37:28 Host: 182.64.214.77/182.64.214.77 Port: 445 TCP Blocked |
2020-02-11 04:05:41 |
79.120.237.136 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-11 03:54:46 |
203.205.152.50 | attackbots | ICMP MH Probe, Scan /Distributed - |
2020-02-11 04:17:06 |
1.217.116.142 | attackspambots | Telnet/23 MH Probe, BF, Hack - |
2020-02-11 04:21:30 |
202.131.231.210 | attackbots | $f2bV_matches |
2020-02-11 04:11:41 |
198.108.66.99 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-11 04:36:23 |
202.143.111.156 | attackbotsspam | $f2bV_matches |
2020-02-11 04:06:22 |
180.241.45.85 | attack | SSH bruteforce |
2020-02-11 04:20:15 |
41.212.67.66 | attackspambots | Feb 10 19:41:20 server sshd\[24694\]: Invalid user byd from 41.212.67.66 Feb 10 19:41:20 server sshd\[24694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.212.67.66 Feb 10 19:41:22 server sshd\[24694\]: Failed password for invalid user byd from 41.212.67.66 port 36936 ssh2 Feb 10 19:47:15 server sshd\[25675\]: Invalid user pxl from 41.212.67.66 Feb 10 19:47:15 server sshd\[25675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.212.67.66 ... |
2020-02-11 04:12:24 |
202.131.237.182 | attackspambots | $f2bV_matches |
2020-02-11 04:09:58 |
202.126.208.122 | attackspam | $f2bV_matches |
2020-02-11 04:17:23 |