City: Taipei
Region: Taipei City
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: Data Communication Business Group
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.42.157.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17472
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.42.157.154. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019051700 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 17 21:14:38 CST 2019
;; MSG SIZE rcvd: 118
154.157.42.114.in-addr.arpa domain name pointer 114-42-157-154.dynamic-ip.hinet.net.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
154.157.42.114.in-addr.arpa name = 114-42-157-154.dynamic-ip.hinet.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
182.127.40.209 | attackspam | Unauthorised access (Oct 7) SRC=182.127.40.209 LEN=40 TTL=49 ID=30058 TCP DPT=8080 WINDOW=39826 SYN Unauthorised access (Oct 7) SRC=182.127.40.209 LEN=40 TTL=49 ID=28726 TCP DPT=8080 WINDOW=27005 SYN Unauthorised access (Oct 6) SRC=182.127.40.209 LEN=40 TTL=49 ID=1711 TCP DPT=8080 WINDOW=41130 SYN Unauthorised access (Oct 6) SRC=182.127.40.209 LEN=40 TTL=49 ID=53863 TCP DPT=8080 WINDOW=27005 SYN |
2019-10-07 13:13:41 |
134.209.24.143 | attackspam | Automatic report - Banned IP Access |
2019-10-07 13:44:14 |
117.1.80.45 | attackspambots | " " |
2019-10-07 13:14:17 |
60.215.35.143 | attack | Unauthorised access (Oct 7) SRC=60.215.35.143 LEN=40 TTL=49 ID=43459 TCP DPT=8080 WINDOW=28775 SYN |
2019-10-07 14:07:10 |
41.213.216.242 | attackspam | Oct 7 06:56:02 vpn01 sshd[6812]: Failed password for root from 41.213.216.242 port 57652 ssh2 ... |
2019-10-07 13:47:58 |
198.108.66.73 | attackbots | " " |
2019-10-07 13:57:22 |
106.13.94.96 | attackbotsspam | Oct 6 19:36:44 web9 sshd\[19566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.94.96 user=root Oct 6 19:36:46 web9 sshd\[19566\]: Failed password for root from 106.13.94.96 port 53224 ssh2 Oct 6 19:40:50 web9 sshd\[20094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.94.96 user=root Oct 6 19:40:51 web9 sshd\[20094\]: Failed password for root from 106.13.94.96 port 52376 ssh2 Oct 6 19:44:39 web9 sshd\[20604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.94.96 user=root |
2019-10-07 13:46:23 |
112.85.42.180 | attack | $f2bV_matches |
2019-10-07 13:26:42 |
185.51.38.8 | attackbotsspam | port scan and connect, tcp 80 (http) |
2019-10-07 13:52:29 |
67.215.241.78 | attack | IMAP |
2019-10-07 13:17:42 |
159.65.4.86 | attackbots | Oct 7 07:05:23 www1 sshd\[63256\]: Invalid user 123Qwerty from 159.65.4.86Oct 7 07:05:25 www1 sshd\[63256\]: Failed password for invalid user 123Qwerty from 159.65.4.86 port 48252 ssh2Oct 7 07:09:51 www1 sshd\[63620\]: Invalid user Purple@2017 from 159.65.4.86Oct 7 07:09:53 www1 sshd\[63620\]: Failed password for invalid user Purple@2017 from 159.65.4.86 port 58856 ssh2Oct 7 07:14:11 www1 sshd\[64120\]: Invalid user Isabel@321 from 159.65.4.86Oct 7 07:14:13 www1 sshd\[64120\]: Failed password for invalid user Isabel@321 from 159.65.4.86 port 41238 ssh2 ... |
2019-10-07 13:47:16 |
64.202.187.48 | attack | Oct 7 10:44:42 lcl-usvr-01 sshd[24009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.202.187.48 user=root Oct 7 10:48:20 lcl-usvr-01 sshd[25206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.202.187.48 user=root Oct 7 10:51:59 lcl-usvr-01 sshd[26383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.202.187.48 user=root |
2019-10-07 13:59:29 |
91.225.190.77 | attack | Automatic report - XMLRPC Attack |
2019-10-07 13:20:54 |
82.223.24.191 | attackspambots | Oct 7 07:59:24 MK-Soft-VM6 sshd[22483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.223.24.191 Oct 7 07:59:26 MK-Soft-VM6 sshd[22483]: Failed password for invalid user &*(uioJKL from 82.223.24.191 port 46610 ssh2 ... |
2019-10-07 14:08:24 |
195.154.27.239 | attackspam | Automatic report - Banned IP Access |
2019-10-07 13:50:37 |