City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.114.84.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30719
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;221.114.84.22. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 01:46:08 CST 2025
;; MSG SIZE rcvd: 106
22.84.114.221.in-addr.arpa domain name pointer 221x114x84x22.ap221.ftth.ucom.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
22.84.114.221.in-addr.arpa name = 221x114x84x22.ap221.ftth.ucom.ne.jp.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
146.88.241.130 | proxy | VPN fraud |
2023-04-03 19:16:01 |
185.224.128.248 | attack | Scan port 5060 |
2023-04-03 12:57:36 |
14.0.32.152 | attack | scan port |
2023-03-30 12:44:50 |
203.110.166.51 | attack | attack |
2023-04-03 15:56:22 |
74.82.47.1 | proxy | VPN fraud |
2023-03-30 12:51:00 |
85.209.41.9 | attack | DDoS |
2023-05-10 12:56:36 |
198.144.159.110 | attack | Scan port |
2023-05-03 12:48:28 |
217.20.155.82 | attack | Port scan |
2023-04-06 13:10:06 |
74.82.47.6 | proxy | VPN fraud |
2023-04-03 13:05:55 |
192.241.225.20 | attack | Scan port |
2023-03-31 12:50:26 |
2001:0002:14:5:1:2:bf35:2610 | attacknormal | Hacking my account |
2023-05-07 17:04:44 |
162.142.125.13 | proxy | VPN fraud |
2023-03-29 12:56:42 |
192.168.2.176 | normal | 。 |
2023-04-22 20:49:44 |
162.142.125.87 | proxy | VPN fraud |
2023-03-29 12:58:45 |
103.48.168.176 | spamattack | http//103.48.168.176 |
2023-03-30 07:37:24 |