City: Thái Bình
Region: Thai Binh
Country: Vietnam
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.190.114.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24787
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;113.190.114.21. IN A
;; AUTHORITY SECTION:
. 163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022091502 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 16 10:23:07 CST 2022
;; MSG SIZE rcvd: 107
21.114.190.113.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
21.114.190.113.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
162.243.133.137 | attackspambots | 7001/tcp 2082/tcp 2404/tcp... [2020-03-13/04-10]35pkt,33pt.(tcp),1pt.(udp) |
2020-04-13 05:46:37 |
162.243.133.182 | attackbots | 21/tcp 445/tcp 194/tcp... [2020-03-13/04-12]31pkt,26pt.(tcp),1pt.(udp) |
2020-04-13 05:33:12 |
198.108.67.40 | attack | 47808/tcp 5004/tcp 8083/tcp... [2020-02-12/04-12]87pkt,80pt.(tcp) |
2020-04-13 06:00:19 |
46.238.53.245 | attackbotsspam | Bruteforce detected by fail2ban |
2020-04-13 05:36:58 |
192.174.80.82 | attackspam | Email rejected due to spam filtering |
2020-04-13 05:58:02 |
211.159.188.184 | attack | Invalid user curelea from 211.159.188.184 port 58580 |
2020-04-13 05:42:50 |
200.73.128.100 | attack | Apr 13 01:00:10 tuotantolaitos sshd[9991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.128.100 Apr 13 01:00:11 tuotantolaitos sshd[9991]: Failed password for invalid user craven from 200.73.128.100 port 36556 ssh2 ... |
2020-04-13 06:06:04 |
104.248.149.130 | attackspam | Apr 12 22:36:24 silence02 sshd[25611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.149.130 Apr 12 22:36:26 silence02 sshd[25611]: Failed password for invalid user 1234567890 from 104.248.149.130 port 42998 ssh2 Apr 12 22:40:38 silence02 sshd[25962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.149.130 |
2020-04-13 06:04:58 |
80.82.65.74 | attackbotsspam | slow & solid scanning |
2020-04-13 06:13:12 |
36.48.144.134 | attackbotsspam | 2020-04-12T21:29:57.331181shield sshd\[10960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.48.144.134 user=root 2020-04-12T21:29:59.518861shield sshd\[10960\]: Failed password for root from 36.48.144.134 port 1381 ssh2 2020-04-12T21:33:51.324940shield sshd\[11820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.48.144.134 user=root 2020-04-12T21:33:53.303063shield sshd\[11820\]: Failed password for root from 36.48.144.134 port 1500 ssh2 2020-04-12T21:37:33.872203shield sshd\[12729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.48.144.134 user=root |
2020-04-13 05:50:32 |
156.223.40.135 | attackspam | 2020-04-12 x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=156.223.40.135 |
2020-04-13 06:07:43 |
192.241.239.202 | attackbots | 109/tcp 6379/tcp 8022/tcp... [2020-02-14/04-12]41pkt,36pt.(tcp),1pt.(udp) |
2020-04-13 05:48:19 |
212.64.58.58 | attack | 2020-04-12T21:41:50.583608shield sshd\[13918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.58.58 user=root 2020-04-12T21:41:52.651424shield sshd\[13918\]: Failed password for root from 212.64.58.58 port 57258 ssh2 2020-04-12T21:46:14.037075shield sshd\[14969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.58.58 user=root 2020-04-12T21:46:16.681879shield sshd\[14969\]: Failed password for root from 212.64.58.58 port 49072 ssh2 2020-04-12T21:50:36.967540shield sshd\[15894\]: Invalid user dspace from 212.64.58.58 port 40908 |
2020-04-13 06:00:02 |
220.102.43.235 | attackbots | SSH connection attempt |
2020-04-13 05:37:24 |
51.158.147.66 | attack | SSH Brute-Force reported by Fail2Ban |
2020-04-13 05:51:16 |