City: Taipei
Region: Taipei City
Country: Taiwan, China
Internet Service Provider: Chunghwa
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 1.34.166.215 | attack | port 23 |
2020-05-20 07:02:22 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.34.166.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41303
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;1.34.166.68. IN A
;; AUTHORITY SECTION:
. 478 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022031300 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 13 14:27:05 CST 2022
;; MSG SIZE rcvd: 104
68.166.34.1.in-addr.arpa domain name pointer 1-34-166-68.hinet-ip.hinet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
68.166.34.1.in-addr.arpa name = 1-34-166-68.hinet-ip.hinet.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 144.91.118.133 | attack | Unauthorized connection attempt detected from IP address 144.91.118.133 to port 445 [T] |
2020-07-21 23:40:47 |
| 117.50.6.160 | attack | Unauthorized connection attempt detected from IP address 117.50.6.160 to port 9418 |
2020-07-21 23:42:09 |
| 106.75.2.200 | attack | Unauthorized connection attempt detected from IP address 106.75.2.200 to port 9418 |
2020-07-21 23:03:38 |
| 203.64.230.117 | attackspambots | Unauthorized connection attempt detected |
2020-07-21 23:12:50 |
| 49.207.141.82 | attack | Unauthorized connection attempt from IP address 49.207.141.82 on Port 445(SMB) |
2020-07-21 23:27:33 |
| 196.188.243.246 | attackspam | 445/tcp 445/tcp 445/tcp... [2020-05-20/07-21]7pkt,1pt.(tcp) |
2020-07-21 23:13:09 |
| 171.228.139.171 | attackspam | Unauthorized connection attempt detected from IP address 171.228.139.171 to port 445 [T] |
2020-07-21 23:40:03 |
| 119.184.114.147 | attack | Unauthorized connection attempt detected from IP address 119.184.114.147 to port 2433 [T] |
2020-07-21 23:17:17 |
| 52.224.162.27 | attackspam | Unauthorized connection attempt detected from IP address 52.224.162.27 to port 1433 |
2020-07-21 23:05:56 |
| 40.85.226.217 | attackspambots | Unauthorized connection attempt detected from IP address 40.85.226.217 to port 1433 [T] |
2020-07-21 23:28:31 |
| 91.143.171.138 | attackbotsspam | Unauthorized connection attempt detected from IP address 91.143.171.138 to port 8080 [T] |
2020-07-21 23:22:58 |
| 52.142.14.161 | attackspambots | Unauthorized connection attempt detected from IP address 52.142.14.161 to port 1433 [T] |
2020-07-21 23:06:44 |
| 192.210.189.68 | attack | Unauthorized connection attempt detected from IP address 192.210.189.68 to port 1433 [T] |
2020-07-21 23:13:28 |
| 200.37.232.129 | attack | Unauthorized connection attempt detected from IP address 200.37.232.129 to port 445 [T] |
2020-07-21 23:36:00 |
| 218.92.0.148 | attackspam | Jul 21 17:32:32 piServer sshd[17247]: Failed password for root from 218.92.0.148 port 51309 ssh2 Jul 21 17:32:35 piServer sshd[17247]: Failed password for root from 218.92.0.148 port 51309 ssh2 Jul 21 17:32:40 piServer sshd[17247]: Failed password for root from 218.92.0.148 port 51309 ssh2 ... |
2020-07-21 23:34:44 |