City: Dazhong
Region: Jiangsu
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.93.90.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16667
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;117.93.90.150. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019082401 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 25 02:51:31 CST 2019
;; MSG SIZE rcvd: 117
150.90.93.117.in-addr.arpa domain name pointer 150.90.93.117.broad.yc.js.dynamic.163data.com.cn.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
150.90.93.117.in-addr.arpa name = 150.90.93.117.broad.yc.js.dynamic.163data.com.cn.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
92.118.37.86 | attack | 27.07.2019 16:05:00 Connection to port 4972 blocked by firewall |
2019-07-28 00:48:56 |
198.137.201.98 | attack | Jul 27 18:52:48 OPSO sshd\[13880\]: Invalid user www from 198.137.201.98 port 37862 Jul 27 18:52:48 OPSO sshd\[13880\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.137.201.98 Jul 27 18:52:49 OPSO sshd\[13880\]: Failed password for invalid user www from 198.137.201.98 port 37862 ssh2 Jul 27 18:57:12 OPSO sshd\[14410\]: Invalid user cn_789789 from 198.137.201.98 port 34668 Jul 27 18:57:12 OPSO sshd\[14410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.137.201.98 |
2019-07-28 01:10:10 |
71.6.233.243 | attack | 2087/tcp 2443/tcp 11443/tcp... [2019-06-03/07-27]7pkt,6pt.(tcp),1pt.(udp) |
2019-07-28 01:52:26 |
71.6.233.67 | attackspambots | 7549/tcp 40443/tcp 3790/tcp... [2019-06-28/07-27]4pkt,4pt.(tcp) |
2019-07-28 01:27:29 |
71.6.233.58 | attackbots | 7550/tcp 4443/tcp 6060/tcp... [2019-05-31/07-27]6pkt,5pt.(tcp),1pt.(udp) |
2019-07-28 01:50:08 |
51.79.43.14 | attack | 10 attempts against mh-pma-try-ban on sky.magehost.pro |
2019-07-28 01:37:26 |
45.118.205.254 | attackspambots | Unauthorised access (Jul 27) SRC=45.118.205.254 LEN=40 TTL=245 ID=9612 DF TCP DPT=8080 WINDOW=14600 SYN |
2019-07-28 00:47:23 |
188.136.171.14 | attackbotsspam | port scan and connect, tcp 80 (http) |
2019-07-28 01:57:33 |
162.218.64.59 | attack | Jul 27 18:54:48 meumeu sshd[23861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.64.59 Jul 27 18:54:50 meumeu sshd[23861]: Failed password for invalid user Aloha from 162.218.64.59 port 57469 ssh2 Jul 27 18:59:26 meumeu sshd[24343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.64.59 ... |
2019-07-28 01:02:53 |
202.114.122.193 | attackspam | Jul 27 19:46:37 OPSO sshd\[21335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.114.122.193 user=root Jul 27 19:46:39 OPSO sshd\[21335\]: Failed password for root from 202.114.122.193 port 54449 ssh2 Jul 27 19:49:11 OPSO sshd\[21534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.114.122.193 user=root Jul 27 19:49:13 OPSO sshd\[21534\]: Failed password for root from 202.114.122.193 port 37068 ssh2 Jul 27 19:51:45 OPSO sshd\[21891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.114.122.193 user=root |
2019-07-28 01:57:03 |
5.63.151.114 | attackspambots | 7002/tcp 2004/tcp 8009/tcp... [2019-06-03/07-26]9pkt,7pt.(tcp),1pt.(udp) |
2019-07-28 01:39:21 |
119.9.12.232 | attackspambots | Jul 27 18:39:59 vps647732 sshd[677]: Failed password for root from 119.9.12.232 port 34543 ssh2 ... |
2019-07-28 00:57:47 |
118.97.213.249 | attackbotsspam | Repeated brute force against a port |
2019-07-28 01:25:39 |
37.24.143.134 | attack | Jul 27 20:02:17 server sshd\[5695\]: User root from 37.24.143.134 not allowed because listed in DenyUsers Jul 27 20:02:17 server sshd\[5695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.24.143.134 user=root Jul 27 20:02:19 server sshd\[5695\]: Failed password for invalid user root from 37.24.143.134 port 50166 ssh2 Jul 27 20:10:55 server sshd\[21333\]: User root from 37.24.143.134 not allowed because listed in DenyUsers Jul 27 20:10:55 server sshd\[21333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.24.143.134 user=root |
2019-07-28 01:16:46 |
185.200.118.72 | attackspambots | proto=tcp . spt=35911 . dpt=3389 . src=185.200.118.72 . dst=xx.xx.4.1 . (listed on Alienvault Jul 27) (876) |
2019-07-28 01:30:08 |