City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.17.166.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39839
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;199.17.166.69. IN A
;; AUTHORITY SECTION:
. 563 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019110100 1800 900 604800 86400
;; Query time: 145 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 15:10:58 CST 2019
;; MSG SIZE rcvd: 117
69.166.17.199.in-addr.arpa domain name pointer elearning.winona.edu.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
69.166.17.199.in-addr.arpa name = elearning.winona.edu.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
124.251.58.87 | attack | Scan port |
2024-01-11 22:34:29 |
104.152.52.209 | attack | Scan port |
2023-12-26 22:36:23 |
185.161.248.192 | attack | Scan port |
2024-01-05 13:58:32 |
111.90.150.188 | bots | Clo |
2024-01-29 00:27:45 |
44.210.80.1 | attack | Scan port |
2023-12-15 16:09:03 |
111.90.150.188 | spamattack | noqiejekj |
2024-01-19 01:24:21 |
146.190.72.131 | botsattack | hacking |
2024-02-14 13:49:59 |
185.230.45.39 | spambotsattackproxynormal | He stole account |
2023-12-17 22:10:20 |
51.222.24.181 | attack | Scan port |
2023-12-20 22:31:28 |
111.90.150.188 | spambotsattackproxynormal | Yaa |
2024-01-04 06:31:10 |
185.110.56.133 | attack | Scan port |
2024-01-25 17:13:30 |
104.152.52.243 | attack | Scan port |
2024-01-11 13:53:36 |
149.154.167.222 | attack | Scan port |
2023-12-27 22:26:48 |
111.90.150.188 | spambotsattackproxynormal | Yaa |
2024-01-04 06:31:03 |
104.152.52.88 | attack | Scan port |
2024-01-15 22:00:29 |