City: unknown
Region: unknown
Country: Switzerland
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.2.231.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24178
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.2.231.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 19:38:22 CST 2025
;; MSG SIZE rcvd: 104
42.231.2.85.in-addr.arpa domain name pointer 42.231.2.85.dynamic.cust.swisscom.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.231.2.85.in-addr.arpa name = 42.231.2.85.dynamic.cust.swisscom.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 159.223.48.200 | spambotsattackproxynormal | Coba mau masuk bosku |
2023-04-17 13:13:30 |
| 92.63.196.139 | attack | Scan port |
2023-04-07 13:25:08 |
| 117.239.128.2 | proxy | Police vpn |
2023-04-25 21:20:25 |
| 45.93.16.81 | attack | Scan port DDoS |
2023-03-23 15:04:05 |
| 107.170.51.199 | attack | Scan port |
2023-03-31 12:47:12 |
| 45.93.16.216 | attack | Scan port DDoS |
2023-03-23 15:04:28 |
| 2001:fd8:22a0:95c:6854:6efe:5c45:2258 | attack | Port sniffing |
2023-04-25 11:30:18 |
| 103.166.10.163 | spambotsattackproxynormal | Application |
2023-03-24 07:54:51 |
| 167.248.133.36 | proxy | VPN fraud |
2023-04-04 13:01:29 |
| 92.63.196.94 | attack | Scan port |
2023-04-06 13:07:55 |
| 146.88.241.120 | proxy | VPN fraud |
2023-04-03 19:20:15 |
| 65.49.20.124 | proxy | VPN fraud |
2023-04-03 13:08:01 |
| 83.171.108.239 | attack | Scan port |
2023-03-22 13:34:22 |
| 103.166.10.163 | spambotsattackproxynormal | Application |
2023-03-24 07:55:01 |
| 92.63.196.97 | attack | Scan port |
2023-03-31 12:45:07 |