City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.87.164.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20925
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;45.87.164.221. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 22:09:27 CST 2025
;; MSG SIZE rcvd: 106
221.164.87.45.in-addr.arpa domain name pointer 45.87.164.221.static.xtom.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
221.164.87.45.in-addr.arpa name = 45.87.164.221.static.xtom.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 77.247.108.77 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 62 - port: 8090 proto: TCP cat: Misc Attack |
2020-03-29 03:23:45 |
| 141.98.83.11 | attack | ET SCAN MS Terminal Server Traffic on Non-standard Port - port: 10000 proto: TCP cat: Attempted Information Leak |
2020-03-29 03:11:59 |
| 65.19.174.198 | attack | SIP/5060 Probe, BF, Hack - |
2020-03-29 03:26:09 |
| 37.49.226.133 | attackspambots | firewall-block, port(s): 23/tcp |
2020-03-29 03:35:03 |
| 51.83.207.116 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 37 - port: 4000 proto: TCP cat: Misc Attack |
2020-03-29 03:29:14 |
| 45.143.220.208 | attackspambots | 45.143.220.208 was recorded 6 times by 6 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 6, 16, 117 |
2020-03-29 03:30:36 |
| 45.141.84.29 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 27 - port: 4000 proto: TCP cat: Misc Attack |
2020-03-29 03:31:23 |
| 122.227.180.165 | attackspam | Unauthorized connection attempt detected from IP address 122.227.180.165 to port 1433 [T] |
2020-03-29 03:13:25 |
| 222.186.133.204 | attackbotsspam | SIP/5060 Probe, BF, Hack - |
2020-03-29 03:36:30 |
| 61.148.205.166 | attack | Unauthorized connection attempt detected from IP address 61.148.205.166 to port 1433 [T] |
2020-03-29 03:27:36 |
| 92.118.37.83 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 86 - port: 5333 proto: TCP cat: Misc Attack |
2020-03-29 03:16:28 |
| 51.75.52.127 | attackbots | ET CINS Active Threat Intelligence Poor Reputation IP group 37 - port: 7401 proto: TCP cat: Misc Attack |
2020-03-29 03:29:56 |
| 192.241.238.193 | attack | port scan and connect, tcp 443 (https) |
2020-03-29 03:04:33 |
| 71.6.167.142 | attack | Automatic report - Banned IP Access |
2020-03-29 03:24:36 |
| 85.230.174.220 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 75 - port: 5555 proto: TCP cat: Misc Attack |
2020-03-29 03:20:48 |