City: unknown
Region: unknown
Country: Republic of China (ROC)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.232.44.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30035
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;118.232.44.139. IN A
;; AUTHORITY SECTION:
. 253 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 06:52:53 CST 2022
;; MSG SIZE rcvd: 107
139.44.232.118.in-addr.arpa domain name pointer 118-232-44-139.dynamic.kbronet.com.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.44.232.118.in-addr.arpa name = 118-232-44-139.dynamic.kbronet.com.tw.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
222.105.228.70 | attack | Unauthorized connection attempt detected from IP address 222.105.228.70 to port 23 [J] |
2020-02-04 06:45:53 |
220.81.240.239 | attackspambots | Unauthorized connection attempt detected from IP address 220.81.240.239 to port 2323 [J] |
2020-02-04 07:10:03 |
177.9.247.92 | attackbotsspam | Unauthorized connection attempt detected from IP address 177.9.247.92 to port 80 [J] |
2020-02-04 07:12:45 |
49.236.195.48 | attack | Unauthorized connection attempt detected from IP address 49.236.195.48 to port 2220 [J] |
2020-02-04 06:43:11 |
220.191.249.136 | attack | Unauthorized connection attempt detected from IP address 220.191.249.136 to port 6379 [J] |
2020-02-04 06:46:11 |
62.234.190.102 | attackspam | Unauthorized connection attempt detected from IP address 62.234.190.102 to port 8088 [J] |
2020-02-04 07:05:10 |
148.70.18.216 | attack | Unauthorized connection attempt detected from IP address 148.70.18.216 to port 2220 [J] |
2020-02-04 06:56:28 |
211.137.225.21 | attackspam | Unauthorized connection attempt detected from IP address 211.137.225.21 to port 23 [J] |
2020-02-04 07:10:19 |
37.252.189.70 | attackspambots | Feb 3 19:34:16 firewall sshd[9183]: Invalid user damage from 37.252.189.70 Feb 3 19:34:17 firewall sshd[9183]: Failed password for invalid user damage from 37.252.189.70 port 60952 ssh2 Feb 3 19:37:18 firewall sshd[9346]: Invalid user 12345 from 37.252.189.70 ... |
2020-02-04 07:08:42 |
193.70.42.33 | attack | Unauthorized connection attempt detected from IP address 193.70.42.33 to port 2220 [J] |
2020-02-04 06:49:43 |
171.99.130.98 | attackbotsspam | Unauthorized connection attempt detected from IP address 171.99.130.98 to port 23 [J] |
2020-02-04 06:54:13 |
223.15.154.186 | attackspam | Honeypot attack, port: 81, PTR: PTR record not found |
2020-02-04 06:45:28 |
177.126.161.114 | attack | 1433/tcp 1433/tcp 1433/tcp... [2020-01-04/02-03]5pkt,1pt.(tcp) |
2020-02-04 06:53:07 |
71.168.131.40 | attackspambots | $f2bV_matches |
2020-02-04 07:03:42 |
93.170.49.121 | attack | Unauthorized connection attempt detected from IP address 93.170.49.121 to port 2323 [J] |
2020-02-04 07:01:38 |