City: unknown
Region: unknown
Country: Türkiye
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.96.77.32
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 799
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;85.96.77.32. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 18:10:49 CST 2025
;; MSG SIZE rcvd: 104
32.77.96.85.in-addr.arpa domain name pointer 85.96.77.32.dynamic.ttnet.com.tr.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
32.77.96.85.in-addr.arpa name = 85.96.77.32.dynamic.ttnet.com.tr.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.224.128.153 | attack | Scan port |
2023-08-01 12:53:31 |
| 113.53.40.126 | spambotsattackproxynormal | / |
2023-07-20 22:04:48 |
| 185.224.128.145 | attack | Scan port |
2023-07-04 21:23:03 |
| 189.126.106.47 | attack | Scan port |
2023-07-03 12:59:52 |
| 92.63.196.33 | botsattack | Scan port |
2023-08-07 12:41:54 |
| 148.66.134.3 | spamattack | "GET","\\/xmlrpc.php" |
2023-08-08 19:41:22 |
| 92.63.196.175 | botsattack | Scan port |
2023-08-10 21:54:01 |
| 218.92.0.37 | attack | ssh |
2023-07-12 23:27:14 |
| 88.230.97.170 | spambotsattackproxynormal | 在此输入备注: |
2023-08-01 08:44:53 |
| 185.80.143.181 | spambotsattackproxynormal | نىىززو ظكم زو |
2023-08-05 23:35:46 |
| 154.26.132.227 | proxy | Okay |
2023-08-03 02:49:39 |
| 45.134.144.249 | attack | Scan port |
2023-08-02 12:45:59 |
| 109.207.200.44 | proxy | Hacking |
2023-07-11 05:23:23 |
| 194.32.122.56 | attack | Scan pport |
2023-07-03 12:58:01 |
| 92.63.196.33 | attack | Scan port |
2023-08-04 22:48:07 |