City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.29.46.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59167
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.29.46.25. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 10:45:21 CST 2025
;; MSG SIZE rcvd: 104
25.46.29.66.in-addr.arpa domain name pointer this.ptr.is.named.in.honor.of.arin.nac.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
25.46.29.66.in-addr.arpa name = this.ptr.is.named.in.honor.of.arin.nac.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 218.102.109.142 | attackspambots | [portscan] tcp/23 [TELNET] [scan/connect: 2 time(s)] *(RWIN=54151,40586)(04301449) |
2020-05-01 00:58:37 |
| 162.243.138.240 | attack | Port scan(s) denied |
2020-05-01 01:30:46 |
| 162.243.137.124 | attackspam | 5007/tcp [2020-04-29/30]2pkt |
2020-05-01 01:06:47 |
| 45.141.84.10 | attack | 2020-04-30T15:02:36.104820vfs-server-01 sshd\[2801\]: Invalid user admin from 45.141.84.10 port 34765 2020-04-30T15:02:39.225833vfs-server-01 sshd\[2805\]: Invalid user support from 45.141.84.10 port 46882 2020-04-30T15:02:43.173281vfs-server-01 sshd\[2809\]: Invalid user user from 45.141.84.10 port 3062 |
2020-05-01 01:20:02 |
| 156.211.118.218 | attackspam | [portscan] tcp/23 [TELNET] *(RWIN=1483)(04301449) |
2020-05-01 01:07:27 |
| 79.79.58.94 | attackbotsspam | [portscan] tcp/23 [TELNET] *(RWIN=14600)(04301449) |
2020-05-01 01:17:12 |
| 162.243.139.167 | attackspambots | " " |
2020-05-01 01:30:24 |
| 83.97.20.31 | attackspam | Port scan(s) denied |
2020-05-01 01:15:52 |
| 176.58.146.241 | attackspambots | [portscan] tcp/23 [TELNET] *(RWIN=14776)(04301449) |
2020-05-01 01:04:17 |
| 36.92.7.187 | attack | [portscan] tcp/23 [TELNET] *(RWIN=14600)(04301449) |
2020-05-01 00:55:55 |
| 182.180.107.130 | attack | [portscan] tcp/23 [TELNET] *(RWIN=46989)(04301449) |
2020-05-01 01:26:08 |
| 181.213.69.52 | attackspambots | [portscan] tcp/23 [TELNET] *(RWIN=36357)(04301449) |
2020-05-01 01:02:34 |
| 204.74.208.130 | attackspambots | [portscan] tcp/1433 [MsSQL] [scan/connect: 2 time(s)] *(RWIN=8192)(04301449) |
2020-05-01 01:24:07 |
| 190.55.111.102 | attackspam | [portscan] tcp/23 [TELNET] *(RWIN=14600)(04301449) |
2020-05-01 01:01:27 |
| 98.128.130.63 | attackbotsspam | Port scan: Attack repeated for 24 hours |
2020-05-01 00:49:37 |