City: Pretoria
Region: Gauteng
Country: South Africa
Internet Service Provider: unknown
Hostname: unknown
Organization: IS
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.215.41.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 315
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.215.41.242. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019061300 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 14:28:43 CST 2019
;; MSG SIZE rcvd: 118
242.41.215.196.in-addr.arpa domain name pointer 196-215-41-242.dynamic.isadsl.co.za.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
242.41.215.196.in-addr.arpa name = 196-215-41-242.dynamic.isadsl.co.za.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
185.63.253.200 | spambotsattackproxy | Ndak tau |
2022-04-23 11:31:47 |
87.249.132.19 | normal | several QNAP-login attempts as user admin |
2022-04-03 19:14:09 |
185.63.253.200 | proxy | 185.63.253.200 |
2022-04-07 01:08:38 |
103.104.130.9 | spambotsattack | spam |
2022-03-28 21:41:44 |
104.87.180.186 | attack | Scan port |
2022-03-31 12:39:43 |
59.4.168.199 | attack | Get tf off my account |
2022-04-05 13:26:05 |
5.254.11.112 | attack | Try to access my NAS a few times. |
2022-04-22 19:48:30 |
5.34.207.81 | spamattack | The IP address [5.34.207.81] experienced 4 failed attempts when attempting to log in to Mail Server running on NAS within 10 minutes, and was blocked at 04/04/2022 12:00. |
2022-04-05 04:41:59 |
185.63.253.200 | proxy | 185.63.253.200 |
2022-04-07 01:08:27 |
118.174.0.249 | spam | yutube |
2022-04-22 21:15:37 |
119.28.2.17 | spam | yutube |
2022-04-22 20:12:39 |
106.75.17.152 | spambotsattackproxynormal | ششششش |
2022-03-30 02:47:33 |
185.63.253.200 | attack | https://www.google.com/url?sa=t&source=web&rct=j&url=https://en.asytech.cn/check-ip/185.63.253.200&ved=2ahUKEwjbl8Kdsvf2AhXzRmwGHZY8AAUQFnoECAgQAQ&usg=AOvVaw3-zhMBEpsXVesH1cUxgnDP |
2022-04-03 15:44:33 |
2001:0002:14:5:1:2:bf35:2610 | spambotsattackproxy | Кражба |
2022-04-26 14:46:05 |
31.43.185.8 | attack | Bruteforce.Generic.Rdp.d |
2022-04-25 22:05:46 |