City: Parramatta
Region: New South Wales
Country: Australia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 110.21.10.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51151
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;110.21.10.142. IN A
;; AUTHORITY SECTION:
. 424 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020033102 1800 900 604800 86400
;; Query time: 178 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 20:38:27 CST 2020
;; MSG SIZE rcvd: 117
142.10.21.110.in-addr.arpa domain name pointer c110-21-10-142.blktn21.nsw.optusnet.com.au.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
142.10.21.110.in-addr.arpa name = c110-21-10-142.blktn21.nsw.optusnet.com.au.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
222.186.52.89 | attackspambots | Aug 23 07:13:05 legacy sshd[23281]: Failed password for root from 222.186.52.89 port 10374 ssh2 Aug 23 07:13:14 legacy sshd[23294]: Failed password for root from 222.186.52.89 port 61276 ssh2 ... |
2019-08-23 13:18:56 |
139.199.192.159 | attackbotsspam | Aug 23 06:56:30 SilenceServices sshd[15953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.192.159 Aug 23 06:56:32 SilenceServices sshd[15953]: Failed password for invalid user vi from 139.199.192.159 port 56996 ssh2 Aug 23 06:59:54 SilenceServices sshd[19060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.192.159 |
2019-08-23 13:15:30 |
89.148.190.137 | attackbotsspam | Invalid user dp from 89.148.190.137 port 40028 |
2019-08-23 14:03:37 |
171.228.184.37 | attack | Invalid user admin from 171.228.184.37 port 54583 |
2019-08-23 13:44:32 |
118.68.170.172 | attack | Aug 23 07:43:00 legacy sshd[24177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.68.170.172 Aug 23 07:43:02 legacy sshd[24177]: Failed password for invalid user custserv from 118.68.170.172 port 48284 ssh2 Aug 23 07:47:44 legacy sshd[24328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.68.170.172 ... |
2019-08-23 13:53:28 |
190.111.196.106 | attackspambots | Invalid user tk from 190.111.196.106 port 53912 |
2019-08-23 13:40:54 |
172.81.212.111 | attackspam | Aug 23 07:18:34 dev0-dcde-rnet sshd[3839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.212.111 Aug 23 07:18:36 dev0-dcde-rnet sshd[3839]: Failed password for invalid user chase from 172.81.212.111 port 49270 ssh2 Aug 23 07:22:22 dev0-dcde-rnet sshd[3867]: Failed password for root from 172.81.212.111 port 53406 ssh2 |
2019-08-23 13:25:41 |
62.213.30.142 | attackbotsspam | Invalid user times from 62.213.30.142 port 37374 |
2019-08-23 14:06:52 |
118.24.95.31 | attack | Aug 22 18:55:52 hiderm sshd\[29575\]: Invalid user user2 from 118.24.95.31 Aug 22 18:55:52 hiderm sshd\[29575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.95.31 Aug 22 18:55:54 hiderm sshd\[29575\]: Failed password for invalid user user2 from 118.24.95.31 port 46614 ssh2 Aug 22 18:59:52 hiderm sshd\[29933\]: Invalid user toku from 118.24.95.31 Aug 22 18:59:52 hiderm sshd\[29933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.95.31 |
2019-08-23 13:16:08 |
170.80.225.230 | attackbots | Invalid user admin from 170.80.225.230 port 40566 |
2019-08-23 13:26:11 |
115.159.237.70 | attackspambots | Invalid user seth from 115.159.237.70 port 59666 |
2019-08-23 13:55:54 |
51.68.47.45 | attackbots | Aug 23 07:57:28 dev0-dcde-rnet sshd[3980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.47.45 Aug 23 07:57:30 dev0-dcde-rnet sshd[3980]: Failed password for invalid user tf from 51.68.47.45 port 56478 ssh2 Aug 23 08:01:21 dev0-dcde-rnet sshd[3985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.47.45 |
2019-08-23 14:09:05 |
41.234.99.7 | attack | Invalid user admin from 41.234.99.7 port 56474 |
2019-08-23 14:09:34 |
165.227.214.163 | attack | Invalid user polycom from 165.227.214.163 port 24904 |
2019-08-23 13:26:34 |
122.175.55.196 | attack | Invalid user hex from 122.175.55.196 port 38011 |
2019-08-23 13:50:59 |