City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.59.52.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;52.59.52.207. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 01:23:48 CST 2025
;; MSG SIZE rcvd: 105
207.52.59.52.in-addr.arpa domain name pointer ec2-52-59-52-207.eu-central-1.compute.amazonaws.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
207.52.59.52.in-addr.arpa name = ec2-52-59-52-207.eu-central-1.compute.amazonaws.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 167.94.138.147 | proxy | VPN fraud |
2023-06-07 12:46:29 |
| 185.233.19.12 | attackproxy | VPN fraud |
2023-06-08 12:55:18 |
| 79.124.49.86 | attack | Scan port |
2023-06-05 12:45:53 |
| 147.78.47.98 | attack | Network Information: Workstation Name: WIN-D87CTLKT6G3 Source Network Address: 147.78.47.35 Source Port: 0 |
2023-06-07 14:02:43 |
| 117.206.185.123 | normal | window.location.replace("http://www.w3schools.com"); |
2023-06-12 09:42:07 |
| 146.88.241.171 | proxy | VPN fraud |
2023-06-05 12:56:47 |
| 162.142.125.12 | proxy | Scan |
2023-06-05 16:37:12 |
| 78.155.196.209 | attack | Phising |
2023-06-02 12:55:23 |
| 92.63.197.73 | attackproxy | Scan port |
2023-06-12 12:49:13 |
| 71.6.231.81 | attackproxy | VPN fraud |
2023-06-10 12:12:49 |
| 117.206.185.123 | normal | '"> |
2023-06-12 09:36:29 |
| 165.232.138.51 | attack | Bokep |
2023-06-08 02:13:23 |
| 117.206.185.123 | normal | "> |