City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.252.149.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39340
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;192.252.149.18. IN A
;; AUTHORITY SECTION:
. 477 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 21:42:04 CST 2022
;; MSG SIZE rcvd: 107
18.149.252.192.in-addr.arpa domain name pointer server304.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
18.149.252.192.in-addr.arpa name = server304.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 113.246.18.181 | botsattack | External Attacks MALWARE Suspicious IoT Worm TELNET Activity -1 |
2023-04-06 12:22:52 |
| 204.15.78.236 | attack | Scan port |
2023-04-03 13:01:30 |
| 192.241.200.48 | proxy | VPN fraud |
2023-04-06 13:12:49 |
| 85.209.41.9 | attack | DDoS |
2023-05-10 12:56:36 |
| 157.230.79.247 | spambotsattackproxynormal | Huyyu8yy |
2023-04-02 14:39:40 |
| 89.248.165.248 | attack | Port scan |
2023-04-03 12:55:09 |
| 192.241.225.20 | attack | Scan port |
2023-03-31 12:50:26 |
| 147.78.47.189 | attack | Scan port |
2023-04-06 12:55:01 |
| 198.199.108.238 | proxy | VPN fraud |
2023-05-10 13:11:44 |
| 162.142.125.87 | proxy | VPN fraud |
2023-03-29 12:58:45 |
| 137.220.233.50 | proxy | Fraud VPN |
2023-05-05 12:55:59 |
| 92.63.196.94 | attack | Scan port |
2023-04-06 13:07:55 |
| 198.199.108.238 | proxy | VPN fraud |
2023-05-10 13:28:24 |
| 128.90.20.19 | attack | IP blocked on server. Log: [Fri Apr 21 01:29:31.309003 2023] [authz_core:error] [pid 224547:tid 140099987682880] [client 128.90.20.19:19566] AH01630: client denied by server configuration: /var/www/html/www.fietsknoop.nl/public_html/public/gpxroutes, referer: https://www.google.com/search?hl=en&q=testing [Fri Apr 21 01:29:31.238379 2023] [authz_core:error] [pid 224547:tid 140099048158784] [client 128.90.20.19:19565] AH01630: client denied by server configuration: /var/www/html/www.fietsknoop.nl/public_html/public/gpxroutes, referer: https://www.google.com/search?hl=en&q=testing [Fri Apr 21 01:29:31.134835 2023] [authz_core:error] [pid 224547:tid 140099056551488] [client 128.90.20.19:19562] AH01630: client denied by server configuration: /var/www/html/www.fietsknoop.nl/public_html/public/gpxroutes, referer: https://www.google.com/search?hl=en&q=testing [Fri Apr 21 01:29:31.082555 2023] [authz_core:error] [pid 224547:tid 140100703712832] [client 128.90.20.19:19561] AH01630: client denied by server configuration: /var/www/html/www.fietsknoop.nl/public_html/public/gpxroutes, referer: https://www.google.com/search?hl=en&q=testing [Fri Apr 21 01:29:30.956404 2023] [authz_core:error] [pid 224547:tid 140098377070144] [client 128.90.20.19:19560] AH01630: client denied by server configuration: /var/www/html/www.fietsknoop.nl/public_html/public/gpxroutes, referer: https://www.google.com/search?hl=en&q=testing [Fri Apr 21 01:29:30.891196 2023] [authz_core:error] [pid 224547:tid 140099031373376] [client 128.90.20.19:19559] AH01630: client denied by server configuration: /var/www/html/www.fietsknoop.nl/public_html/public/gpxroutes, referer: https://www.google.com/search?hl=en&q=testing |
2023-04-21 07:37:12 |
| 121.166.140.160 | attack | Brute-Force login jupyter notebook |
2023-05-04 17:34:55 |