City: unknown
Region: unknown
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: myLoc managed IT AG
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.163.139.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59408
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;89.163.139.7. IN A
;; AUTHORITY SECTION:
. 1786 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019040301 1800 900 604800 86400
;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 04 11:24:57 +08 2019
;; MSG SIZE rcvd: 116
7.139.163.89.in-addr.arpa domain name pointer ur135.Uranus.fastwebserver.de.
Server: 67.207.67.3
Address: 67.207.67.3#53
Non-authoritative answer:
7.139.163.89.in-addr.arpa name = ur135.Uranus.fastwebserver.de.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
159.203.208.5 | proxy | VPN fraud |
2023-03-27 12:42:55 |
192.3.255.115 | attack | Scan port |
2023-03-10 21:03:47 |
183.136.225.9 | proxy | VPN fraud |
2023-03-16 14:01:25 |
196.188.31.17 | attack | Scan port |
2023-03-16 13:46:58 |
89.248.165.25 | attack | 172.21.0.10 => 89.248.165.25:52250 |
2023-03-13 10:23:32 |
185.224.128.232 | attack | Scan port |
2023-03-23 15:09:45 |
45.134.144.4 | attack | Scan port |
2023-03-14 13:42:08 |
167.248.133.175 | proxy | VPN scan |
2023-03-13 13:55:28 |
83.171.108.239 | attack | Scan port |
2023-03-22 13:34:22 |
184.105.139.103 | proxy | VPN fraud |
2023-03-20 14:02:25 |
107.170.253.82 | spamattack | an vps |
2023-03-16 21:00:47 |
87.249.132.22 | attack | Tried to admin login of my qnap nas |
2023-03-25 16:31:08 |
47.110.129.37 | attack | Scan port |
2023-03-10 13:48:44 |
172.217.20.36 | normal | MOBILE_2.4.1.xapk |
2023-03-21 07:20:07 |
92.63.196.134 | attack | Scan port |
2023-03-27 12:40:02 |