City: unknown
Region: unknown
Country: Poland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.5.172.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25382
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;83.5.172.140. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 23:25:49 CST 2025
;; MSG SIZE rcvd: 105
140.172.5.83.in-addr.arpa domain name pointer 83.5.172.140.ipv4.supernova.orange.pl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.172.5.83.in-addr.arpa name = 83.5.172.140.ipv4.supernova.orange.pl.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
185.233.19.5 | proxy | VPN fraud |
2023-05-15 13:11:44 |
198.199.108.238 | proxy | VPN fraud |
2023-05-10 13:28:24 |
92.63.196.136 | attack | Scan port |
2023-05-13 12:49:50 |
194.195.242.36 | attack | Scan port |
2023-05-13 17:08:30 |
92.63.196.139 | attack | Scan port |
2023-04-07 13:25:08 |
209.159.153.66 | proxy | VPN fraud |
2023-05-11 12:58:53 |
192.241.200.48 | proxy | VPN fraud |
2023-04-06 13:12:49 |
23.224.186.49 | proxy | VPN fraud |
2023-05-15 13:01:01 |
2001:0002:14:5:1:2:bf35:2610 | spamattack | Hacking my Google account |
2023-05-02 12:38:34 |
66.254.114.38 | attack | Scan port |
2023-05-05 12:48:35 |
184.105.247.212 | attack | VPN fraud |
2023-05-11 12:56:48 |
159.65.187.118 | attack | Scan port |
2023-05-12 14:15:37 |
142.251.214.133 | spambots | Dropna inplace: ip112.231.35.159 ;value :true |
2023-04-28 16:19:23 |
185.233.19.96 | proxy | VPN fraud |
2023-05-15 13:07:33 |
157.240.241.35 | spambotsattackproxynormal | 157.240.241.35 |
2023-04-23 13:12:31 |