City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.39.165.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;221.39.165.229. IN A
;; AUTHORITY SECTION:
. 474 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 21:18:19 CST 2022
;; MSG SIZE rcvd: 107
229.165.39.221.in-addr.arpa domain name pointer softbank221039165229.bbtec.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
229.165.39.221.in-addr.arpa name = softbank221039165229.bbtec.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 92.45.248.60 | normal | 2587 |
2022-11-05 05:41:47 |
| 219.100.37.219 | proxynormal | Vpn |
2022-10-29 02:42:55 |
| 45.95.147.55 | attack | Brute scan port |
2022-11-16 13:48:28 |
| 146.88.240.4 | attackproxy | first L2TP UDP packet received from 146.88.240.4 |
2022-11-10 14:32:40 |
| 162.243.97.39 | attack | Scan port |
2022-11-14 13:57:30 |
| 104.152.52.234 | attack | DdoS |
2022-10-20 12:45:05 |
| 135.181.192.102 | attack | Hack port |
2022-10-19 12:55:45 |
| 184.31.86.154 | attack | frequent port scans |
2022-11-08 13:42:40 |
| 116.96.44.132 | spambotsattackproxynormal | 116.96.44.132 |
2022-11-06 22:16:44 |
| 92.63.196.131 | attack | attacks port |
2022-11-09 13:39:16 |
| 89.248.165.163 | attack | All port scan |
2022-11-10 13:46:13 |
| 2001:0002:14:5:1:2:bf35:2610 | spamattack | Hack my phone |
2022-10-22 21:24:43 |
| 89.248.165.58 | attack | Port scan |
2022-10-25 12:55:17 |
| 89.248.165.58 | attack | Port scan |
2022-11-04 13:42:50 |
| 89.248.165.162 | attack | Scan port |
2022-11-11 13:45:54 |