City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.33.62.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.33.62.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 07:34:55 CST 2025
;; MSG SIZE rcvd: 104
42.62.33.52.in-addr.arpa domain name pointer ec2-52-33-62-42.us-west-2.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.62.33.52.in-addr.arpa name = ec2-52-33-62-42.us-west-2.compute.amazonaws.com.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
216.250.247.152 | attack | Scan port |
2023-04-03 12:59:44 |
157.230.79.247 | spambotsattackproxynormal | Huyyu8yy |
2023-04-02 14:39:40 |
157.230.79.247 | spambotsattackproxynormal | Huyyu8yy |
2023-04-02 14:39:51 |
92.63.196.94 | attack | Scan port |
2023-03-31 19:28:26 |
178.68.38.11 | attack | Port scan |
2023-03-30 12:46:52 |
74.82.47.6 | proxy | VPN fraud |
2023-04-03 13:05:55 |
74.82.47.1 | proxy | VPN fraud |
2023-03-30 12:51:00 |
117.239.128.2 | proxynormal | Police vpn |
2023-04-25 21:20:45 |
66.254.114.38 | attack | Scan |
2023-04-05 12:57:02 |
14.0.32.152 | attack | Scan port |
2023-03-29 12:51:02 |
108.62.64.75 | attack | Diese IP hat versucht sich in meinen e mail account einzuloggen- erfolglos zum glück |
2023-03-29 07:50:46 |
164.138.20.101 | spam | Spam firehose |
2023-05-02 23:19:18 |
192.241.220.25 | proxy | VPN fraud |
2023-04-03 13:03:49 |
14.0.32.152 | attack | scan port |
2023-03-30 12:44:50 |
198.144.159.105 | attack | Scan port |
2023-05-03 12:54:27 |