City: unknown
Region: unknown
Country: Taiwan (Province of China)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.150.194.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2200
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;118.150.194.12. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 12:47:10 CST 2025
;; MSG SIZE rcvd: 107
12.194.150.118.in-addr.arpa domain name pointer n194-h12.150.118.dynamic.da.net.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
12.194.150.118.in-addr.arpa name = n194-h12.150.118.dynamic.da.net.tw.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
213.14.176.140 | attackspambots | Telnet Server BruteForce Attack |
2019-11-01 00:44:22 |
128.199.170.77 | attack | $f2bV_matches_ltvn |
2019-11-01 00:48:47 |
142.44.184.79 | attackbotsspam | Oct 31 15:00:19 dedicated sshd[20218]: Invalid user test01 from 142.44.184.79 port 56678 |
2019-11-01 00:39:07 |
103.66.79.142 | attack | Unauthorized connection attempt from IP address 103.66.79.142 on Port 445(SMB) |
2019-11-01 00:40:45 |
117.4.242.101 | attack | Unauthorized connection attempt from IP address 117.4.242.101 on Port 445(SMB) |
2019-11-01 00:33:54 |
74.63.250.6 | attackbotsspam | 2019-10-31T12:02:13.023378abusebot-7.cloudsearch.cf sshd\[20876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.250.6 user=root |
2019-11-01 01:02:08 |
189.52.149.134 | attackbots | Unauthorized connection attempt from IP address 189.52.149.134 on Port 445(SMB) |
2019-11-01 00:42:41 |
37.49.227.109 | attackspambots | Portscan or hack attempt detected by psad/fwsnort |
2019-11-01 01:06:46 |
74.82.47.26 | attackbotsspam | 27017/tcp 4786/tcp 2323/tcp... [2019-08-30/10-31]31pkt,17pt.(tcp),1pt.(udp) |
2019-11-01 00:32:51 |
103.10.133.154 | attackbots | Unauthorized connection attempt from IP address 103.10.133.154 on Port 445(SMB) |
2019-11-01 00:52:22 |
188.241.202.23 | attackbotsspam | Unauthorised access (Oct 31) SRC=188.241.202.23 LEN=52 TTL=115 ID=18211 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Oct 31) SRC=188.241.202.23 LEN=52 TTL=115 ID=12976 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Oct 31) SRC=188.241.202.23 LEN=52 TTL=115 ID=11890 DF TCP DPT=1433 WINDOW=8192 SYN Unauthorised access (Oct 31) SRC=188.241.202.23 LEN=52 TTL=115 ID=27180 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Oct 31) SRC=188.241.202.23 LEN=52 TTL=115 ID=14989 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Oct 31) SRC=188.241.202.23 LEN=52 TTL=115 ID=15509 DF TCP DPT=1433 WINDOW=8192 SYN Unauthorised access (Oct 30) SRC=188.241.202.23 LEN=52 TTL=115 ID=3326 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Oct 30) SRC=188.241.202.23 LEN=52 TTL=115 ID=19551 DF TCP DPT=1433 WINDOW=8192 SYN Unauthorised access (Oct 30) SRC=188.241.202.23 LEN=52 TTL=115 ID=1871 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-01 00:32:04 |
2.81.172.237 | attackbotsspam | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/2.81.172.237/ PT - 1H : (12) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : PT NAME ASN : ASN3243 IP : 2.81.172.237 CIDR : 2.80.0.0/14 PREFIX COUNT : 14 UNIQUE IP COUNT : 1704960 ATTACKS DETECTED ASN3243 : 1H - 1 3H - 2 6H - 4 12H - 6 24H - 7 DateTime : 2019-10-31 13:02:19 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN - data recovery |
2019-11-01 00:54:51 |
85.110.114.68 | attack | Unauthorized connection attempt from IP address 85.110.114.68 on Port 445(SMB) |
2019-11-01 00:50:05 |
41.210.128.37 | attackspambots | 2019-10-31T11:57:21.649267shield sshd\[32452\]: Invalid user scan from 41.210.128.37 port 59162 2019-10-31T11:57:21.653494shield sshd\[32452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=h25.n1.ips.mtn.co.ug 2019-10-31T11:57:24.074594shield sshd\[32452\]: Failed password for invalid user scan from 41.210.128.37 port 59162 ssh2 2019-10-31T12:02:42.076096shield sshd\[1481\]: Invalid user anup from 41.210.128.37 port 49820 2019-10-31T12:02:42.081314shield sshd\[1481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=h25.n1.ips.mtn.co.ug |
2019-11-01 00:39:40 |
116.31.115.251 | attackspambots | Lines containing failures of 116.31.115.251 Oct 31 12:08:56 kopano sshd[18520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.31.115.251 user=r.r Oct 31 12:08:58 kopano sshd[18520]: Failed password for r.r from 116.31.115.251 port 45796 ssh2 Oct 31 12:08:58 kopano sshd[18520]: Received disconnect from 116.31.115.251 port 45796:11: Bye Bye [preauth] Oct 31 12:08:58 kopano sshd[18520]: Disconnected from authenticating user r.r 116.31.115.251 port 45796 [preauth] Oct 31 12:35:10 kopano sshd[19457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.31.115.251 user=r.r Oct 31 12:35:13 kopano sshd[19457]: Failed password for r.r from 116.31.115.251 port 56596 ssh2 Oct 31 12:35:13 kopano sshd[19457]: Received disconnect from 116.31.115.251 port 56596:11: Bye Bye [preauth] Oct 31 12:35:13 kopano sshd[19457]: Disconnected from authenticating user r.r 116.31.115.251 port 56596 [preauth] Oct 3........ ------------------------------ |
2019-11-01 00:34:12 |