City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.39.242.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28577
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;113.39.242.215.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 13:58:14 CST 2025
;; MSG SIZE  rcvd: 107215.242.39.113.in-addr.arpa domain name pointer 113x39x242x215.ap113.ftth.ucom.ne.jp.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
215.242.39.113.in-addr.arpa	name = 113x39x242x215.ap113.ftth.ucom.ne.jp.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 116.92.213.114 | attackbotsspam | Jul 25 19:34:20 fhem-rasp sshd[17422]: Invalid user wayne from 116.92.213.114 port 46524 ... | 2020-07-26 04:26:30 | 
| 196.17.238.91 | attackbotsspam | Automatic report - Banned IP Access | 2020-07-26 05:00:10 | 
| 45.55.237.182 | attackbots | Bruteforce detected by fail2ban | 2020-07-26 05:02:06 | 
| 190.96.246.31 | attackbotsspam | Jul 25 17:13:40 pl3server sshd[11538]: Invalid user guest from 190.96.246.31 port 24481 Jul 25 17:13:40 pl3server sshd[11538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.96.246.31 Jul 25 17:13:42 pl3server sshd[11538]: Failed password for invalid user guest from 190.96.246.31 port 24481 ssh2 Jul 25 17:13:42 pl3server sshd[11538]: Received disconnect from 190.96.246.31 port 24481:11: Bye Bye [preauth] Jul 25 17:13:42 pl3server sshd[11538]: Disconnected from 190.96.246.31 port 24481 [preauth] Jul 25 17:18:29 pl3server sshd[15828]: Invalid user kmw from 190.96.246.31 port 11649 Jul 25 17:18:29 pl3server sshd[15828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.96.246.31 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=190.96.246.31 | 2020-07-26 04:24:33 | 
| 128.199.121.32 | attackbotsspam | Exploited Host. | 2020-07-26 04:26:55 | 
| 128.199.129.68 | attack | Exploited Host. | 2020-07-26 04:26:01 | 
| 71.6.233.13 | attack | " " | 2020-07-26 04:54:51 | 
| 125.74.95.195 | attack | Exploited Host. | 2020-07-26 04:37:21 | 
| 150.136.31.34 | attack | Failed password for invalid user ulli from 150.136.31.34 port 36880 ssh2 | 2020-07-26 04:40:14 | 
| 58.162.229.173 | attackspambots | Automatic report - Banned IP Access | 2020-07-26 04:24:07 | 
| 106.12.74.99 | attack | Jul 25 17:09:13 minden010 sshd[9971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.74.99 Jul 25 17:09:16 minden010 sshd[9971]: Failed password for invalid user jhernandez from 106.12.74.99 port 47372 ssh2 Jul 25 17:12:50 minden010 sshd[10720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.74.99 ... | 2020-07-26 04:35:35 | 
| 125.91.32.157 | attackspam | Exploited Host. | 2020-07-26 04:34:43 | 
| 125.124.117.226 | attackspam | firewall-block, port(s): 32523/tcp | 2020-07-26 05:02:55 | 
| 150.107.176.130 | attackspam | (sshd) Failed SSH login from 150.107.176.130 (IN/India/node-150-107-176-130.alliancebroadband.in): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 25 19:54:33 amsweb01 sshd[20903]: Invalid user sherry from 150.107.176.130 port 39858 Jul 25 19:54:35 amsweb01 sshd[20903]: Failed password for invalid user sherry from 150.107.176.130 port 39858 ssh2 Jul 25 20:01:47 amsweb01 sshd[21871]: Invalid user ubuntu from 150.107.176.130 port 45540 Jul 25 20:01:49 amsweb01 sshd[21871]: Failed password for invalid user ubuntu from 150.107.176.130 port 45540 ssh2 Jul 25 20:04:55 amsweb01 sshd[22251]: Invalid user user from 150.107.176.130 port 34206 | 2020-07-26 04:49:51 | 
| 45.145.66.96 | attack | ET DROP Dshield Block Listed Source group 1 - port: 6633 proto: tcp cat: Misc Attackbytes: 60 | 2020-07-26 04:27:59 |