City: unknown
Region: unknown
Country: China
Internet Service Provider: ChinaNet Beijing Province Network
Hostname: unknown
Organization: unknown
Usage Type: unknown
Type | Details | Datetime |
---|---|---|
attackbots | Invalid user sdtdserver from 106.39.16.242 port 2051 |
2020-08-30 20:17:06 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.39.16.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28261
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.39.16.242. IN A
;; AUTHORITY SECTION:
. 277 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020083000 1800 900 604800 86400
;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 30 20:16:58 CST 2020
;; MSG SIZE rcvd: 117
Host 242.16.39.106.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 242.16.39.106.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
85.192.156.101 | attack | unauthorized connection attempt |
2020-01-28 15:43:48 |
58.152.244.138 | attackbotsspam | unauthorized connection attempt |
2020-01-28 15:53:32 |
208.93.153.177 | attack | IP: 208.93.153.177 Ports affected http protocol over TLS/SSL (443) Abuse Confidence rating 100% Found in DNSBL('s) ASN Details AS40913 Quality Technology Services Santa Clara LLC United States (US) CIDR 208.93.152.0/22 Log Date: 28/01/2020 6:20:05 AM UTC |
2020-01-28 15:23:02 |
188.237.50.113 | attack | Unauthorized connection attempt detected from IP address 188.237.50.113 to port 1433 [J] |
2020-01-28 15:47:40 |
178.93.14.76 | attackspambots | unauthorized connection attempt |
2020-01-28 16:00:59 |
89.248.168.62 | attackspam | Jan 28 07:57:52 debian-2gb-nbg1-2 kernel: \[2453939.505875\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.168.62 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=52749 PROTO=TCP SPT=53469 DPT=1234 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-01-28 15:29:20 |
117.201.151.57 | attackspam | unauthorized connection attempt |
2020-01-28 16:03:02 |
89.250.223.123 | attack | unauthorized connection attempt |
2020-01-28 15:42:26 |
142.93.128.238 | attackbotsspam | port scan and connect, tcp 443 (https) |
2020-01-28 15:28:09 |
116.88.111.132 | attackbotsspam | unauthorized connection attempt |
2020-01-28 15:40:22 |
74.82.47.48 | attack | unauthorized access on port 443 [https] FO |
2020-01-28 15:30:35 |
176.107.123.109 | attackspambots | Unauthorized connection attempt detected from IP address 176.107.123.109 to port 80 [J] |
2020-01-28 15:38:09 |
89.250.223.64 | attackspambots | unauthorized connection attempt |
2020-01-28 15:43:04 |
195.158.100.201 | attackspam | Invalid user admin from 195.158.100.201 port 45228 |
2020-01-28 15:24:13 |
91.20.79.155 | attackspam | unauthorized connection attempt |
2020-01-28 15:52:02 |