City: unknown
Region: New Taipei
Country: Taiwan, China
Internet Service Provider: Chunghwa
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.161.55.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6603
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;1.161.55.134. IN A
;; AUTHORITY SECTION:
. 303 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023041501 1800 900 604800 86400
;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 16 07:52:07 CST 2023
;; MSG SIZE rcvd: 105
134.55.161.1.in-addr.arpa domain name pointer 1-161-55-134.dynamic-ip.hinet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
134.55.161.1.in-addr.arpa name = 1-161-55-134.dynamic-ip.hinet.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
115.97.52.120 | attackspam | Honeypot attack, port: 81, PTR: PTR record not found |
2020-01-18 21:17:45 |
89.191.226.95 | attack | Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage=" |
2020-01-18 21:23:04 |
190.85.15.251 | attackbotsspam | Unauthorized connection attempt detected from IP address 190.85.15.251 to port 2220 [J] |
2020-01-18 21:32:44 |
124.105.34.104 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-18 21:14:37 |
46.101.77.58 | attack | Jan 18 13:26:26 XXX sshd[21812]: Invalid user office from 46.101.77.58 port 49120 |
2020-01-18 21:12:12 |
213.200.15.183 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2020-01-18 21:44:01 |
94.229.66.131 | attackspam | Automatic report - Banned IP Access |
2020-01-18 21:43:36 |
49.235.38.225 | attack | 20 attempts against mh-ssh on cloud.magehost.pro |
2020-01-18 21:11:48 |
114.226.62.62 | attack | Honeypot attack, port: 81, PTR: PTR record not found |
2020-01-18 21:34:42 |
112.85.42.173 | attack | Jan 18 14:14:13 MK-Soft-VM7 sshd[4577]: Failed password for root from 112.85.42.173 port 32417 ssh2 Jan 18 14:14:18 MK-Soft-VM7 sshd[4577]: Failed password for root from 112.85.42.173 port 32417 ssh2 ... |
2020-01-18 21:24:34 |
177.73.142.200 | attackbots | Unauthorized connection attempt detected from IP address 177.73.142.200 to port 8080 [J] |
2020-01-18 21:02:53 |
168.194.251.75 | attackspambots | Unauthorized connection attempt detected from IP address 168.194.251.75 to port 23 [J] |
2020-01-18 21:03:23 |
129.211.16.236 | attackbots | Jan 18 15:52:06 server sshd\[28179\]: Invalid user o from 129.211.16.236 Jan 18 15:52:06 server sshd\[28179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.16.236 Jan 18 15:52:07 server sshd\[28179\]: Failed password for invalid user o from 129.211.16.236 port 44983 ssh2 Jan 18 16:01:50 server sshd\[31477\]: Invalid user unitek from 129.211.16.236 Jan 18 16:01:50 server sshd\[31477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.16.236 ... |
2020-01-18 21:43:24 |
165.22.191.129 | attackspambots | Automatic report - Banned IP Access |
2020-01-18 21:33:35 |
104.248.149.130 | attackbotsspam | 2020-01-18T13:35:09.191110shield sshd\[12349\]: Invalid user mongodb from 104.248.149.130 port 58984 2020-01-18T13:35:09.199460shield sshd\[12349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.149.130 2020-01-18T13:35:11.185996shield sshd\[12349\]: Failed password for invalid user mongodb from 104.248.149.130 port 58984 ssh2 2020-01-18T13:37:57.974817shield sshd\[13671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.149.130 user=root 2020-01-18T13:38:00.026735shield sshd\[13671\]: Failed password for root from 104.248.149.130 port 57750 ssh2 |
2020-01-18 21:39:35 |