City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.206.136.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.206.136.139. IN A
;; AUTHORITY SECTION:
. 445 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 06:57:44 CST 2022
;; MSG SIZE rcvd: 108
139.136.206.121.in-addr.arpa domain name pointer 139.136.206.121.broad.sm.fj.dynamic.163data.com.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
139.136.206.121.in-addr.arpa name = 139.136.206.121.broad.sm.fj.dynamic.163data.com.cn.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
68.62.75.13 | attack | Unauthorized connection attempt detected from IP address 68.62.75.13 to port 80 [J] |
2020-01-21 16:49:19 |
107.172.2.130 | attack | Jan 21 10:11:37 www2 sshd\[26866\]: Invalid user virtual from 107.172.2.130Jan 21 10:11:40 www2 sshd\[26866\]: Failed password for invalid user virtual from 107.172.2.130 port 33513 ssh2Jan 21 10:14:57 www2 sshd\[27060\]: Invalid user spigot from 107.172.2.130 ... |
2020-01-21 16:44:00 |
58.59.176.111 | attackspambots | Unauthorized connection attempt detected from IP address 58.59.176.111 to port 1433 [J] |
2020-01-21 16:51:55 |
162.222.216.44 | attack | Unauthorized connection attempt detected from IP address 162.222.216.44 to port 85 [J] |
2020-01-21 17:00:40 |
183.247.214.197 | attack | Unauthorized connection attempt detected from IP address 183.247.214.197 to port 9000 [J] |
2020-01-21 16:57:49 |
196.52.43.114 | attackbots | Unauthorized connection attempt detected from IP address 196.52.43.114 to port 1026 [J] |
2020-01-21 16:55:54 |
185.91.177.42 | attackspam | Unauthorized connection attempt detected from IP address 185.91.177.42 to port 8080 [J] |
2020-01-21 16:36:07 |
118.70.67.52 | attack | Unauthorized connection attempt detected from IP address 118.70.67.52 to port 2220 [J] |
2020-01-21 16:42:32 |
170.106.38.159 | attackspam | Unauthorized connection attempt detected from IP address 170.106.38.159 to port 8885 [J] |
2020-01-21 16:38:18 |
186.251.21.52 | attackbots | Unauthorized connection attempt detected from IP address 186.251.21.52 to port 23 [J] |
2020-01-21 16:35:52 |
171.237.139.21 | attackspambots | Unauthorized connection attempt detected from IP address 171.237.139.21 to port 23 [J] |
2020-01-21 16:59:53 |
91.121.223.54 | attack | Unauthorized connection attempt detected from IP address 91.121.223.54 to port 990 [J] |
2020-01-21 16:45:50 |
85.133.207.202 | attack | Unauthorized connection attempt detected from IP address 85.133.207.202 to port 8080 [J] |
2020-01-21 16:46:30 |
122.117.194.47 | attack | Unauthorized connection attempt detected from IP address 122.117.194.47 to port 4567 [J] |
2020-01-21 16:41:50 |
123.207.101.205 | attackbotsspam | Unauthorized connection attempt detected from IP address 123.207.101.205 to port 2220 [J] |
2020-01-21 16:41:33 |