City: unknown
Region: unknown
Country: Republic of China (ROC)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.108.101.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45784
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;120.108.101.127. IN A
;; AUTHORITY SECTION:
. 417 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 06:37:36 CST 2022
;; MSG SIZE rcvd: 108
127.101.108.120.in-addr.arpa domain name pointer rd.asia.edu.tw.
127.101.108.120.in-addr.arpa domain name pointer asiamodern.asia.edu.tw.
127.101.108.120.in-addr.arpa domain name pointer acc.asia.edu.tw.
127.101.108.120.in-addr.arpa domain name pointer general.asia.edu.tw.
127.101.108.120.in-addr.arpa domain name pointer iic.asia.edu.tw.
127.101.108.120.in-addr.arpa domain name pointer sd.asia.edu.tw.
127.101.108.120.in-addr.arpa domain name pointer ac.asia.edu.tw.
127.101.108.120.in-addr.arpa domain name pointer persond.asia.edu.tw.
127.101.108.120.in-addr.arpa domain name pointer rc.asia.edu.tw.
127.101.108.120.in-addr.arpa domain name pointer library.asia.edu.tw.
127.101.108.120.in-addr.arpa domain name pointer dual.asia.edu.tw.
127.101.108.120.in-addr.arpa domain name pointer asia.edu.tw.
127.101.108.120.in-addr.arpa domain name pointer orbitadm3.asia.edu.tw.
127.101.108.120.in-addr.arpa domain name pointer *.orbitadm3.asia.edu.tw.
127.101.108.120.in-addr.arpa domain name pointer www.asia.edu.tw.
127.101.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
127.101.108.120.in-addr.arpa name = www.asia.edu.tw.
127.101.108.120.in-addr.arpa name = sec.asia.edu.tw.
127.101.108.120.in-addr.arpa name = orbitadm3.asia.edu.tw.
127.101.108.120.in-addr.arpa name = ic.asia.edu.tw.
127.101.108.120.in-addr.arpa name = rd.asia.edu.tw.
127.101.108.120.in-addr.arpa name = asiamodern.asia.edu.tw.
127.101.108.120.in-addr.arpa name = acc.asia.edu.tw.
127.101.108.120.in-addr.arpa name = general.asia.edu.tw.
127.101.108.120.in-addr.arpa name = iic.asia.edu.tw.
127.101.108.120.in-addr.arpa name = sd.asia.edu.tw.
127.101.108.120.in-addr.arpa name = ac.asia.edu.tw.
127.101.108.120.in-addr.arpa name = persond.asia.edu.tw.
127.101.108.120.in-addr.arpa name = rc.asia.edu.tw.
127.101.108.120.in-addr.arpa name = library.asia.edu.tw.
127.101.108.120.in-addr.arpa name = dual.asia.edu.tw.
127.101.108.120.in-addr.arpa name = *.orbitadm3.asia.edu.tw.
127.101.108.120.in-addr.arpa name = asia.edu.tw.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
114.232.59.211 | attackbotsspam | 2019-06-23T21:32:24.421383 X postfix/smtpd[39204]: warning: unknown[114.232.59.211]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-06-23T21:33:42.059421 X postfix/smtpd[39209]: warning: unknown[114.232.59.211]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-06-23T21:50:35.369347 X postfix/smtpd[41518]: warning: unknown[114.232.59.211]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-06-24 11:15:15 |
171.101.60.46 | attackspambots | port scan and connect, tcp 8080 (http-proxy) |
2019-06-24 11:45:34 |
185.234.219.98 | attack | Jun 24 03:45:24 mail postfix/smtpd\[12725\]: warning: unknown\[185.234.219.98\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 24 03:55:30 mail postfix/smtpd\[12873\]: warning: unknown\[185.234.219.98\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 24 04:26:04 mail postfix/smtpd\[13547\]: warning: unknown\[185.234.219.98\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 24 04:36:14 mail postfix/smtpd\[13606\]: warning: unknown\[185.234.219.98\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-06-24 11:47:05 |
213.42.70.42 | attackspambots | Many RDP login attempts detected by IDS script |
2019-06-24 11:51:50 |
199.249.230.116 | attackbots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.249.230.116 user=root Failed password for root from 199.249.230.116 port 7296 ssh2 Failed password for root from 199.249.230.116 port 7296 ssh2 Failed password for root from 199.249.230.116 port 7296 ssh2 Failed password for root from 199.249.230.116 port 7296 ssh2 |
2019-06-24 11:37:11 |
121.226.57.182 | attackbotsspam | 2019-06-23T22:52:38.144467 X postfix/smtpd[57674]: warning: unknown[121.226.57.182]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-06-23T23:03:33.355139 X postfix/smtpd[59885]: warning: unknown[121.226.57.182]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-06-23T23:03:56.139804 X postfix/smtpd[59885]: warning: unknown[121.226.57.182]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-06-24 11:46:04 |
95.6.61.11 | attackspam | SSH invalid-user multiple login try |
2019-06-24 11:30:17 |
179.108.240.104 | attackbotsspam | SMTP-sasl brute force ... |
2019-06-24 11:56:08 |
106.58.213.77 | attackspam | Trying ports that it shouldn't be. |
2019-06-24 11:05:08 |
41.249.137.131 | attackspam | SSH/22 MH Probe, BF, Hack - |
2019-06-24 11:34:05 |
178.128.171.212 | attackspambots | fail2ban honeypot |
2019-06-24 11:17:20 |
13.232.11.224 | attackbots | 20 attempts against mh-ssh on pluto.magehost.pro |
2019-06-24 11:27:22 |
199.249.230.77 | attack | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.249.230.77 user=root Failed password for root from 199.249.230.77 port 52968 ssh2 Failed password for root from 199.249.230.77 port 52968 ssh2 Failed password for root from 199.249.230.77 port 52968 ssh2 Failed password for root from 199.249.230.77 port 52968 ssh2 |
2019-06-24 11:34:57 |
205.185.114.149 | attack | *Port Scan* detected from 205.185.114.149 (US/United States/-). 11 hits in the last 216 seconds |
2019-06-24 11:46:44 |
198.23.231.118 | attack | contact form abuse, "increase traffic" spam words in content from Lorelei, likesviraldemo@gmail.com |
2019-06-24 11:52:24 |