City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.39.81.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51637
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;120.39.81.14. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 12:11:51 CST 2025
;; MSG SIZE rcvd: 105
14.81.39.120.in-addr.arpa domain name pointer 14.81.39.120.broad.xm.fj.dynamic.163data.com.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
14.81.39.120.in-addr.arpa name = 14.81.39.120.broad.xm.fj.dynamic.163data.com.cn.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
124.219.98.180 | attackbots | Automatic report - FTP Brute Force |
2020-06-16 21:40:35 |
103.45.120.43 | attackspambots | Jun 16 14:45:10 abendstille sshd\[29739\]: Invalid user virl from 103.45.120.43 Jun 16 14:45:10 abendstille sshd\[29739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.120.43 Jun 16 14:45:12 abendstille sshd\[29739\]: Failed password for invalid user virl from 103.45.120.43 port 39076 ssh2 Jun 16 14:45:56 abendstille sshd\[30358\]: Invalid user user from 103.45.120.43 Jun 16 14:45:56 abendstille sshd\[30358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.120.43 ... |
2020-06-16 21:37:40 |
46.38.150.191 | attack | 2020-06-16 15:58:52 dovecot_login authenticator failed for \(User\) \[46.38.150.191\]: 535 Incorrect authentication data \(set_id=contractor@org.ua\)2020-06-16 16:00:28 dovecot_login authenticator failed for \(User\) \[46.38.150.191\]: 535 Incorrect authentication data \(set_id=aaa2@org.ua\)2020-06-16 16:02:04 dovecot_login authenticator failed for \(User\) \[46.38.150.191\]: 535 Incorrect authentication data \(set_id=relmodule@org.ua\) ... |
2020-06-16 21:05:18 |
192.144.218.143 | attack | Jun 16 14:07:40 ns392434 sshd[810]: Invalid user nancy from 192.144.218.143 port 52798 Jun 16 14:07:40 ns392434 sshd[810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.218.143 Jun 16 14:07:40 ns392434 sshd[810]: Invalid user nancy from 192.144.218.143 port 52798 Jun 16 14:07:42 ns392434 sshd[810]: Failed password for invalid user nancy from 192.144.218.143 port 52798 ssh2 Jun 16 14:18:44 ns392434 sshd[1098]: Invalid user user from 192.144.218.143 port 40504 Jun 16 14:18:44 ns392434 sshd[1098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.218.143 Jun 16 14:18:44 ns392434 sshd[1098]: Invalid user user from 192.144.218.143 port 40504 Jun 16 14:18:45 ns392434 sshd[1098]: Failed password for invalid user user from 192.144.218.143 port 40504 ssh2 Jun 16 14:23:46 ns392434 sshd[1179]: Invalid user ems from 192.144.218.143 port 33768 |
2020-06-16 21:23:38 |
202.62.224.61 | attack | Jun 16 14:23:42 * sshd[2868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.62.224.61 Jun 16 14:23:44 * sshd[2868]: Failed password for invalid user user01 from 202.62.224.61 port 36421 ssh2 |
2020-06-16 21:27:12 |
5.135.165.51 | attack | 2020-06-16T13:30:21.119225shield sshd\[1621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3317937.ip-5-135-165.eu user=root 2020-06-16T13:30:23.192541shield sshd\[1621\]: Failed password for root from 5.135.165.51 port 36014 ssh2 2020-06-16T13:33:48.471836shield sshd\[2236\]: Invalid user itadmin from 5.135.165.51 port 37180 2020-06-16T13:33:48.475781shield sshd\[2236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3317937.ip-5-135-165.eu 2020-06-16T13:33:50.293639shield sshd\[2236\]: Failed password for invalid user itadmin from 5.135.165.51 port 37180 ssh2 |
2020-06-16 21:41:58 |
5.63.151.108 | attack | " " |
2020-06-16 21:28:14 |
46.165.230.5 | attackbotsspam | $f2bV_matches |
2020-06-16 21:46:27 |
221.225.81.86 | attackspambots | Jun 16 15:32:11 abendstille sshd\[12590\]: Invalid user lijia from 221.225.81.86 Jun 16 15:32:11 abendstille sshd\[12590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.225.81.86 Jun 16 15:32:13 abendstille sshd\[12590\]: Failed password for invalid user lijia from 221.225.81.86 port 46886 ssh2 Jun 16 15:35:41 abendstille sshd\[16332\]: Invalid user nell from 221.225.81.86 Jun 16 15:35:41 abendstille sshd\[16332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.225.81.86 ... |
2020-06-16 21:39:18 |
89.248.168.217 | attackbotsspam | 89.248.168.217 was recorded 12 times by 6 hosts attempting to connect to the following ports: 177,514,139. Incident counter (4h, 24h, all-time): 12, 19, 21283 |
2020-06-16 21:06:42 |
129.211.18.180 | attackspam | Jun 16 07:00:54 server1 sshd\[19555\]: Invalid user mes from 129.211.18.180 Jun 16 07:00:54 server1 sshd\[19555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.18.180 Jun 16 07:00:56 server1 sshd\[19555\]: Failed password for invalid user mes from 129.211.18.180 port 14479 ssh2 Jun 16 07:03:03 server1 sshd\[21074\]: Invalid user a from 129.211.18.180 Jun 16 07:03:03 server1 sshd\[21074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.18.180 Jun 16 07:03:05 server1 sshd\[21074\]: Failed password for invalid user a from 129.211.18.180 port 37933 ssh2 Jun 16 07:05:15 server1 sshd\[22549\]: Invalid user gabby from 129.211.18.180 Jun 16 07:05:15 server1 sshd\[22549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.18.180 Jun 16 07:05:17 server1 sshd\[22549\]: Failed password for invalid user gabby from 129.211.18.180 port 61401 ssh2 Jun 16 07:07:27 server |
2020-06-16 21:29:50 |
180.215.255.11 | attack | Jun 16 12:41:59 localhost sshd[41957]: Invalid user cynthia from 180.215.255.11 port 38172 Jun 16 12:41:59 localhost sshd[41957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.215.255.11 Jun 16 12:41:59 localhost sshd[41957]: Invalid user cynthia from 180.215.255.11 port 38172 Jun 16 12:42:01 localhost sshd[41957]: Failed password for invalid user cynthia from 180.215.255.11 port 38172 ssh2 Jun 16 12:47:52 localhost sshd[42585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.215.255.11 user=root Jun 16 12:47:54 localhost sshd[42585]: Failed password for root from 180.215.255.11 port 39118 ssh2 ... |
2020-06-16 21:12:35 |
139.199.80.67 | attackbotsspam | Jun 16 14:43:29 electroncash sshd[20443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.80.67 Jun 16 14:43:29 electroncash sshd[20443]: Invalid user griselda from 139.199.80.67 port 49426 Jun 16 14:43:31 electroncash sshd[20443]: Failed password for invalid user griselda from 139.199.80.67 port 49426 ssh2 Jun 16 14:47:24 electroncash sshd[21518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.80.67 user=root Jun 16 14:47:27 electroncash sshd[21518]: Failed password for root from 139.199.80.67 port 36962 ssh2 ... |
2020-06-16 21:20:13 |
222.186.15.158 | attackbotsspam | Unauthorized connection attempt detected from IP address 222.186.15.158 to port 22 |
2020-06-16 21:36:57 |
222.186.175.150 | attackbots | Jun 16 09:17:31 lanister sshd[30883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150 user=root Jun 16 09:17:33 lanister sshd[30883]: Failed password for root from 222.186.175.150 port 12782 ssh2 |
2020-06-16 21:22:51 |