City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.220.229.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6209
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;34.220.229.229. IN A
;; AUTHORITY SECTION:
. 388 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400
;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 17:12:12 CST 2022
;; MSG SIZE rcvd: 107
229.229.220.34.in-addr.arpa domain name pointer ec2-34-220-229-229.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
229.229.220.34.in-addr.arpa name = ec2-34-220-229-229.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
88.172.135.117 | attack | Hacking |
2024-02-25 19:14:10 |
2001:0002:14:5:1:23:bf35:2610 | spambotsattackproxynormal | 23497 |
2024-02-07 19:06:38 |
185.224.128.192 | attack | Scan port |
2024-02-28 13:28:22 |
77.91.68.175 | botsattack | hacking |
2024-02-14 13:52:49 |
104.218.234.170 | attack | Scan port |
2024-02-27 14:14:19 |
79.124.62.130 | attack | Scan port |
2024-02-27 22:07:39 |
147.182.222.178 | attack | hacking |
2024-02-25 19:19:14 |
94.156.8.2 | attack | hacking |
2024-02-16 13:34:04 |
88.172.135.117 | botsattack | Hacking |
2024-02-28 13:36:10 |
104.152.52.96 | attack | Scan port |
2024-02-20 13:44:55 |
205.209.104.2 | attack | Scan port |
2024-02-22 13:53:19 |
91.196.121.240 | attack | hacking |
2024-02-17 18:04:16 |
45.156.128.27 | attack | hacking |
2024-02-16 13:30:44 |
185.224.128.192 | attack | Scan port |
2024-02-25 19:00:38 |
149.154.167.223 | attack | Scan port |
2024-02-20 21:21:53 |