City: Allentown
Region: Pennsylvania
Country: United States
Internet Service Provider: Verizon
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 63.90.41.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24059
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;63.90.41.92. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400
;; Query time: 304 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 08:15:55 CST 2025
;; MSG SIZE rcvd: 104
Host 92.41.90.63.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 92.41.90.63.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
175.10.53.164 | attack | Port Scan: TCP/23 |
2019-09-03 02:21:28 |
175.17.14.36 | attackbots | Port Scan: TCP/23 |
2019-09-03 02:21:00 |
27.207.49.0 | attack | Port Scan: TCP/22 |
2019-09-03 01:51:21 |
12.235.255.106 | attackbotsspam | Port Scan: UDP/53 |
2019-09-03 01:52:54 |
12.34.32.130 | attackspambots | Port Scan: UDP/137 |
2019-09-03 01:53:48 |
35.238.133.33 | attack | Port Scan: TCP/443 |
2019-09-03 01:49:51 |
187.188.232.88 | attackspam | Port Scan: TCP/88 |
2019-09-03 02:00:53 |
216.83.58.81 | attackspambots | Unauthorized connection attempt from IP address 216.83.58.81 on Port 445(SMB) |
2019-09-03 02:30:28 |
75.82.107.253 | attack | Port Scan: UDP/137 |
2019-09-03 02:11:15 |
45.145.18.3 | attackspam | Port Scan: TCP/80 |
2019-09-03 02:40:40 |
100.35.96.102 | attack | Port Scan: TCP/23 |
2019-09-03 02:10:00 |
205.215.217.162 | attackspambots | Port Scan: UDP/137 |
2019-09-03 02:30:47 |
60.18.33.217 | attackspambots | Port Scan: TCP/8080 |
2019-09-03 02:25:08 |
220.147.219.110 | attackbots | Port Scan: TCP/3389 |
2019-09-03 01:54:37 |
70.88.89.106 | attackspam | Port Scan: UDP/124 |
2019-09-03 02:12:29 |