City: unknown
Region: unknown
Country: Netherlands (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 89.99.165.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;89.99.165.4. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 00:40:58 CST 2025
;; MSG SIZE rcvd: 104
4.165.99.89.in-addr.arpa domain name pointer 89-99-165-4.cable.dynamic.v4.ziggo.nl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
4.165.99.89.in-addr.arpa name = 89-99-165-4.cable.dynamic.v4.ziggo.nl.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 113.70.79.0 | attack | Sat, 20 Jul 2019 21:55:00 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 11:45:36 |
| 194.156.251.48 | attackspam | Sat, 20 Jul 2019 21:54:48 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 12:17:35 |
| 206.189.190.32 | attack | $f2bV_matches |
2019-07-21 12:17:03 |
| 113.160.5.250 | attack | Sat, 20 Jul 2019 21:55:03 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 11:36:18 |
| 46.20.98.25 | attackspam | Sat, 20 Jul 2019 21:54:56 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 11:57:28 |
| 190.191.50.6 | attackbots | Sat, 20 Jul 2019 21:54:46 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 12:23:01 |
| 183.83.68.194 | attack | Sat, 20 Jul 2019 21:54:42 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 12:34:46 |
| 179.198.148.204 | attack | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 20:43:04,095 INFO [amun_request_handler] PortScan Detected on Port: 445 (179.198.148.204) |
2019-07-21 11:45:10 |
| 218.92.0.190 | attackspambots | Jul 21 07:12:20 webhost01 sshd[31064]: Failed password for root from 218.92.0.190 port 37721 ssh2 ... |
2019-07-21 12:14:35 |
| 85.243.169.187 | attack | Sat, 20 Jul 2019 21:54:47 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 12:21:39 |
| 194.190.86.95 | attackspam | Sat, 20 Jul 2019 21:54:58 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 11:51:32 |
| 200.71.193.218 | attackspambots | Sat, 20 Jul 2019 21:54:45 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 12:27:01 |
| 58.8.233.218 | attack | Sat, 20 Jul 2019 21:54:44 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 12:31:22 |
| 180.190.114.220 | attack | Sat, 20 Jul 2019 21:54:47 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 12:20:27 |
| 14.207.201.36 | attack | Sat, 20 Jul 2019 21:54:43 +0000 likely compromised host or open proxy. ddos rate spidering |
2019-07-21 12:34:29 |