City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.54.44.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12887
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;119.54.44.116. IN A
;; AUTHORITY SECTION:
. 596 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030900 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 15:47:52 CST 2022
;; MSG SIZE rcvd: 106
116.44.54.119.in-addr.arpa domain name pointer 116.44.54.119.adsl-pool.jlccptt.net.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
116.44.54.119.in-addr.arpa name = 116.44.54.119.adsl-pool.jlccptt.net.cn.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 92.118.161.33 | attack | " " |
2020-02-20 04:57:09 |
| 114.32.86.201 | attack | Honeypot attack, port: 4567, PTR: 114-32-86-201.HINET-IP.hinet.net. |
2020-02-20 05:13:50 |
| 36.72.212.209 | attackbots | Unauthorized connection attempt from IP address 36.72.212.209 on Port 445(SMB) |
2020-02-20 05:03:33 |
| 192.186.128.2 | spam | Used undred times per day for SPAM, PHISHING, SCAM and SEXE on STOLLEN list we don't know where without our agreement, as usual with LIERS and ROBERS ! Especially by uniregistry.com ? https://www.mywot.com/scorecard/casinovips.com And the same few hours before... By GoDaddy.com, une autre SOUS MERDE adepte d'ESCROCS... https://www.mywot.com/scorecard/bonusmasters.com |
2020-02-20 05:03:40 |
| 37.57.210.11 | attackbots | Unauthorized connection attempt from IP address 37.57.210.11 on Port 445(SMB) |
2020-02-20 05:10:02 |
| 125.209.125.146 | attackbotsspam | Unauthorized connection attempt detected from IP address 125.209.125.146 to port 445 |
2020-02-20 04:39:52 |
| 107.161.16.141 | attack | Lines containing failures of 107.161.16.141 (max 1000) Feb 19 17:00:43 localhost sshd[28899]: Invalid user ftp from 107.161.16.141 port 50237 Feb 19 17:00:43 localhost sshd[28899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.161.16.141 Feb 19 17:00:45 localhost sshd[28899]: Failed password for invalid user ftp from 107.161.16.141 port 50237 ssh2 Feb 19 17:00:45 localhost sshd[28899]: Received disconnect from 107.161.16.141 port 50237:11: Bye Bye [preauth] Feb 19 17:00:45 localhost sshd[28899]: Disconnected from invalid user ftp 107.161.16.141 port 50237 [preauth] Feb 19 17:11:56 localhost sshd[31253]: Invalid user pai from 107.161.16.141 port 53642 Feb 19 17:11:56 localhost sshd[31253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.161.16.141 Feb 19 17:11:58 localhost sshd[31253]: Failed password for invalid user pai from 107.161.16.141 port 53642 ssh2 Feb 19 17:11:58 localhos........ ------------------------------ |
2020-02-20 04:47:19 |
| 92.118.161.49 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-20 04:47:47 |
| 179.124.227.234 | attackbots | Unauthorized connection attempt detected from IP address 179.124.227.234 to port 1433 |
2020-02-20 04:43:51 |
| 218.32.44.73 | attackbots | Port probing on unauthorized port 5555 |
2020-02-20 05:14:06 |
| 191.102.89.123 | attackspambots | Unauthorized connection attempt from IP address 191.102.89.123 on Port 445(SMB) |
2020-02-20 04:51:43 |
| 123.30.246.169 | attackspambots | Honeypot attack, port: 445, PTR: static.vnpt.vn. |
2020-02-20 04:56:27 |
| 14.189.95.63 | attackspambots | Honeypot attack, port: 445, PTR: static.vnpt.vn. |
2020-02-20 05:00:07 |
| 186.18.168.10 | attack | Unauthorized connection attempt from IP address 186.18.168.10 on Port 445(SMB) |
2020-02-20 05:10:33 |
| 181.191.28.10 | attackspambots | Port probing on unauthorized port 23 |
2020-02-20 04:45:27 |