City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.149.129.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38517
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;242.149.129.132. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025030802 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 09 09:49:33 CST 2025
;; MSG SIZE rcvd: 108
Host 132.129.149.242.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 132.129.149.242.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
206.189.139.179 | attackspam | $f2bV_matches |
2020-02-27 04:27:39 |
203.220.101.126 | attackspambots | $f2bV_matches |
2020-02-27 04:57:08 |
206.81.7.42 | attack | Feb 26 17:11:10 host sshd[38624]: Invalid user developer from 206.81.7.42 port 51984 ... |
2020-02-27 04:53:10 |
203.6.234.177 | attackbotsspam | $f2bV_matches |
2020-02-27 04:44:23 |
205.151.119.227 | attackbots | $f2bV_matches |
2020-02-27 04:34:13 |
206.174.214.90 | attack | $f2bV_matches |
2020-02-27 04:31:56 |
181.28.249.199 | attackspambots | Feb 26 15:05:40 ws24vmsma01 sshd[38603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.28.249.199 Feb 26 15:05:42 ws24vmsma01 sshd[38603]: Failed password for invalid user bitnami from 181.28.249.199 port 32034 ssh2 ... |
2020-02-27 04:38:57 |
206.189.153.178 | attackbotsspam | $f2bV_matches |
2020-02-27 04:21:32 |
91.215.244.12 | attackbotsspam | $f2bV_matches |
2020-02-27 04:26:27 |
203.210.192.106 | attackbotsspam | $f2bV_matches |
2020-02-27 04:58:56 |
114.5.216.11 | attack | Honeypot attack, port: 445, PTR: 114-5-216-11.resources.indosat.com. |
2020-02-27 04:31:32 |
206.189.146.13 | attackbots | $f2bV_matches |
2020-02-27 04:22:59 |
125.163.36.72 | attackspam | Honeypot attack, port: 445, PTR: 72.subnet125-163-36.speedy.telkom.net.id. |
2020-02-27 04:47:54 |
89.144.47.246 | attackspam | Port scan: Attack repeated for 24 hours |
2020-02-27 04:48:54 |
203.95.212.41 | attack | $f2bV_matches |
2020-02-27 04:38:25 |