City: unknown
Region: unknown
Country: Multicast Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 228.71.132.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49880
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;228.71.132.137. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400
;; Query time: 192 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 10:34:04 CST 2025
;; MSG SIZE rcvd: 107
Host 137.132.71.228.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 137.132.71.228.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 114.125.236.41 | spambotsattackproxynormal | Tolong hapus IP ini |
2021-11-04 04:09:13 |
| 5.188.62.147 | spam | Party Snaaps Pһoito Booth OC | Photo Βooth Rental Օrane County 12911 Dungan Ln, Garden Ꮐrove, CA 92840 360 Photo Boοth Rental Temple City |
2021-10-29 01:31:55 |
| 169.254.126.53 | attack | Hack Wi-Fi |
2021-11-06 07:17:42 |
| 167.71.69.246 | attacknormal | 167.71.69.94/?ref |
2021-11-11 22:55:29 |
| 66.181.186.42 | attack | Trying to enter to bank account |
2021-11-14 15:02:19 |
| 89.99.187.230 | attack | Try to break into server! |
2021-11-22 17:47:13 |
| 167.71.69.246 | attacknormal | 167.71.69.94/?ref |
2021-11-11 22:55:43 |
| 220.81.240.239 | attack | Unauthorized connection attempt detected from IP address 220.81.240.239 into my MEGA account |
2021-12-24 03:40:43 |
| 45.155.205.233 | attack | cve-2021-44228 |
2021-12-11 04:28:43 |
| 109.201.39.162 | attack | Attacks on my servers |
2021-12-06 04:33:25 |
| 192.168.1.1 | attack | Wifi_Perso_2.4G |
2021-12-14 07:43:49 |
| 192.168.1.48 | normal | Nama Telkomsel GPRS WEB APN Internet |
2021-12-07 22:48:40 |
| 154.28.188.174 | attack | Attempting to access QNAP using Admin account. Recommend blocking IP address, using strong passwords, two-factor authentication, and disable default Admin account entirely. |
2021-11-21 05:37:26 |
| 45.155.205.233 | attack | cve-2021-44228 |
2021-12-11 04:28:37 |
| 192.168.1.1 | attack | Wifi_Perso_2.4G |
2021-12-14 07:43:31 |