City: Singapore
Region: unknown
Country: Singapore
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.14.89.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56602
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;116.14.89.95. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024122000 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 21 01:02:59 CST 2024
;; MSG SIZE rcvd: 105
95.89.14.116.in-addr.arpa domain name pointer bb116-14-89-95.singnet.com.sg.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
95.89.14.116.in-addr.arpa name = bb116-14-89-95.singnet.com.sg.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 213.230.91.122 | attackspambots | Nov 23 07:19:01 mxgate1 postfix/postscreen[17755]: CONNECT from [213.230.91.122]:17005 to [176.31.12.44]:25 Nov 23 07:19:01 mxgate1 postfix/dnsblog[17756]: addr 213.230.91.122 listed by domain zen.spamhaus.org as 127.0.0.11 Nov 23 07:19:01 mxgate1 postfix/dnsblog[17756]: addr 213.230.91.122 listed by domain zen.spamhaus.org as 127.0.0.4 Nov 23 07:19:01 mxgate1 postfix/dnsblog[17798]: addr 213.230.91.122 listed by domain cbl.abuseat.org as 127.0.0.2 Nov 23 07:19:01 mxgate1 postfix/dnsblog[17758]: addr 213.230.91.122 listed by domain b.barracudacentral.org as 127.0.0.2 Nov 23 07:19:01 mxgate1 postfix/postscreen[17755]: PREGREET 23 after 0.14 from [213.230.91.122]:17005: EHLO [213.230.91.122] Nov 23 07:19:05 mxgate1 postfix/postscreen[17755]: DNSBL rank 4 for [213.230.91.122]:17005 Nov x@x Nov 23 07:19:30 mxgate1 postfix/postscreen[17755]: HANGUP after 25 from [213.230.91.122]:17005 in tests after SMTP handshake Nov 23 07:19:30 mxgate1 postfix/postscreen[17755]: DISCONNEC........ ------------------------------- |
2019-11-23 18:43:31 |
| 178.62.118.53 | attack | Nov 23 06:24:23 venus sshd\[26528\]: Invalid user redmine123456 from 178.62.118.53 port 49164 Nov 23 06:24:23 venus sshd\[26528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.118.53 Nov 23 06:24:26 venus sshd\[26528\]: Failed password for invalid user redmine123456 from 178.62.118.53 port 49164 ssh2 ... |
2019-11-23 18:34:54 |
| 66.96.233.31 | attack | Nov 23 00:09:44 kapalua sshd\[23562\]: Invalid user 123321 from 66.96.233.31 Nov 23 00:09:44 kapalua sshd\[23562\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.96.233.31 Nov 23 00:09:45 kapalua sshd\[23562\]: Failed password for invalid user 123321 from 66.96.233.31 port 36103 ssh2 Nov 23 00:15:06 kapalua sshd\[24024\]: Invalid user hsiu from 66.96.233.31 Nov 23 00:15:06 kapalua sshd\[24024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.96.233.31 |
2019-11-23 18:22:26 |
| 185.176.27.98 | attackbots | 185.176.27.98 was recorded 6 times by 4 hosts attempting to connect to the following ports: 48972,48970,48971. Incident counter (4h, 24h, all-time): 6, 42, 3219 |
2019-11-23 18:45:10 |
| 118.126.108.213 | attackspam | Nov 23 11:40:33 sd-53420 sshd\[18543\]: Invalid user kabeer from 118.126.108.213 Nov 23 11:40:33 sd-53420 sshd\[18543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.108.213 Nov 23 11:40:35 sd-53420 sshd\[18543\]: Failed password for invalid user kabeer from 118.126.108.213 port 50560 ssh2 Nov 23 11:45:05 sd-53420 sshd\[19684\]: Invalid user temp from 118.126.108.213 Nov 23 11:45:05 sd-53420 sshd\[19684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.108.213 ... |
2019-11-23 18:53:14 |
| 67.85.105.1 | attackspambots | Fail2Ban Ban Triggered |
2019-11-23 18:20:21 |
| 106.12.70.107 | attackbots | Nov 23 10:36:00 vpn01 sshd[25527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.70.107 Nov 23 10:36:02 vpn01 sshd[25527]: Failed password for invalid user abcdefghijklmnopqrst from 106.12.70.107 port 33760 ssh2 ... |
2019-11-23 18:33:03 |
| 103.60.126.80 | attackbots | $f2bV_matches |
2019-11-23 18:44:27 |
| 5.88.188.77 | attack | Invalid user server from 5.88.188.77 port 40232 |
2019-11-23 18:29:03 |
| 96.30.69.142 | attackspambots | Lines containing failures of 96.30.69.142 Nov 23 07:15:32 shared02 sshd[16358]: Invalid user admin from 96.30.69.142 port 44980 Nov 23 07:15:32 shared02 sshd[16358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.30.69.142 Nov 23 07:15:34 shared02 sshd[16358]: Failed password for invalid user admin from 96.30.69.142 port 44980 ssh2 Nov 23 07:15:34 shared02 sshd[16358]: Connection closed by invalid user admin 96.30.69.142 port 44980 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=96.30.69.142 |
2019-11-23 18:41:15 |
| 51.254.32.228 | attackbotsspam | Nov 23 09:35:01 localhost sshd\[19999\]: Invalid user guest from 51.254.32.228 port 50126 Nov 23 09:35:01 localhost sshd\[19999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.32.228 Nov 23 09:35:03 localhost sshd\[19999\]: Failed password for invalid user guest from 51.254.32.228 port 50126 ssh2 ... |
2019-11-23 18:37:57 |
| 212.162.149.88 | attackspam | Nov 23 01:19:56 eola postfix/smtpd[11185]: connect from unknown[212.162.149.88] Nov 23 01:19:56 eola postfix/smtpd[11185]: lost connection after AUTH from unknown[212.162.149.88] Nov 23 01:19:56 eola postfix/smtpd[11185]: disconnect from unknown[212.162.149.88] ehlo=1 auth=0/1 commands=1/2 Nov 23 01:19:56 eola postfix/smtpd[11185]: connect from unknown[212.162.149.88] Nov 23 01:19:56 eola postfix/smtpd[11185]: lost connection after AUTH from unknown[212.162.149.88] Nov 23 01:19:56 eola postfix/smtpd[11185]: disconnect from unknown[212.162.149.88] ehlo=1 auth=0/1 commands=1/2 Nov 23 01:19:56 eola postfix/smtpd[11185]: connect from unknown[212.162.149.88] Nov 23 01:19:56 eola postfix/smtpd[11185]: lost connection after AUTH from unknown[212.162.149.88] Nov 23 01:19:56 eola postfix/smtpd[11185]: disconnect from unknown[212.162.149.88] ehlo=1 auth=0/1 commands=1/2 Nov 23 01:19:56 eola postfix/smtpd[11185]: connect from unknown[212.162.149.88] Nov 23 01:19:56 eola postfix/sm........ ------------------------------- |
2019-11-23 18:45:51 |
| 186.153.138.2 | attackbotsspam | Invalid user server from 186.153.138.2 port 49128 |
2019-11-23 18:47:39 |
| 103.40.235.215 | attack | SSH Brute Force, server-1 sshd[22855]: Failed password for invalid user nero from 103.40.235.215 port 47011 ssh2 |
2019-11-23 18:37:30 |
| 128.199.118.27 | attackspambots | Automatic report - Banned IP Access |
2019-11-23 18:37:17 |