City: unknown
Region: Osaka
Country: Japan
Internet Service Provider: SoftBank
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.116.98.187
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31652
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;61.116.98.187. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 10:19:56 CST 2025
;; MSG SIZE rcvd: 106
187.98.116.61.in-addr.arpa domain name pointer KCNfm-01p1-187.ppp11.odn.ad.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
187.98.116.61.in-addr.arpa name = KCNfm-01p1-187.ppp11.odn.ad.jp.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
152.32.141.130 | proxy | VPN fraud |
2023-03-22 13:46:21 |
192.168.2.176 | normal | 。 |
2023-04-22 20:49:44 |
90.151.171.106 | attack | Scan port |
2023-03-23 14:15:47 |
103.160.201.163 | attack | banen |
2023-03-28 03:11:00 |
157.240.241.35 | spambotsattackproxynormal | 157.240.241.35 |
2023-04-23 13:12:31 |
65.49.20.114 | proxy | VPN fraud |
2023-04-07 13:32:29 |
149.18.73.19 | attack | Scan port |
2023-04-06 12:52:43 |
103.160.201.163 | attack | banen |
2023-03-28 03:10:53 |
104.152.52.110 | attack | Scan port |
2023-04-05 12:53:49 |
92.63.196.138 | attack | Scan port |
2023-04-04 12:50:00 |
113.246.18.181 | botsattack | External Attacks MALWARE Suspicious IoT Worm TELNET Activity -1 |
2023-04-06 12:22:52 |
87.249.132.22 | attack | Tried to admin login of my qnap nas |
2023-03-25 16:31:08 |
162.142.125.214 | proxy | VPN fraud |
2023-03-31 12:54:37 |
104.227.69.129 | spam | tries to hack me |
2023-04-03 23:53:08 |
103.166.10.163 | spambotsattackproxynormal | Application |
2023-03-24 07:56:24 |