City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.6.120.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62361
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;122.6.120.68. IN A
;; AUTHORITY SECTION:
. 430 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 20:05:50 CST 2022
;; MSG SIZE rcvd: 105
68.120.6.122.in-addr.arpa domain name pointer 68.120.6.122.broad.rz.sd.dynamic.163data.com.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
68.120.6.122.in-addr.arpa name = 68.120.6.122.broad.rz.sd.dynamic.163data.com.cn.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
179.124.31.178 | attack | Autoban 179.124.31.178 AUTH/CONNECT |
2019-06-28 23:49:59 |
42.99.180.167 | attackbots | SSH invalid-user multiple login attempts |
2019-06-28 23:28:42 |
143.0.140.237 | attackspam | Jun 28 09:48:29 web1 postfix/smtpd[10088]: warning: unknown[143.0.140.237]: SASL PLAIN authentication failed: authentication failure ... |
2019-06-29 00:08:53 |
62.173.149.176 | attack | $f2bV_matches |
2019-06-29 00:04:11 |
2.184.208.48 | attackbotsspam | 2019-06-28 14:30:37,405 fail2ban.actions [23326]: NOTICE [portsentry] Ban 2.184.208.48 ... |
2019-06-28 23:53:35 |
193.56.28.105 | attackspam | 2019-06-26 10:27:15 server smtpd[87692]: warning: unknown[193.56.28.105]:62233: SASL LOGIN authentication failed: Invalid authentication mechanism |
2019-06-28 23:27:35 |
177.130.139.87 | attackbots | $f2bV_matches |
2019-06-28 23:20:37 |
36.74.75.31 | attackspambots | ssh failed login |
2019-06-28 23:22:58 |
125.24.46.109 | attackbots | firewall-block, port(s): 80/tcp |
2019-06-28 23:05:25 |
47.105.71.189 | attackspam | " " |
2019-06-28 23:30:31 |
185.137.111.22 | attackspambots | Jun 28 16:21:09 mail postfix/smtpd\[18884\]: warning: unknown\[185.137.111.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 28 16:51:19 mail postfix/smtpd\[19739\]: warning: unknown\[185.137.111.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 28 16:51:59 mail postfix/smtpd\[19739\]: warning: unknown\[185.137.111.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ Jun 28 16:52:39 mail postfix/smtpd\[19738\]: warning: unknown\[185.137.111.22\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\ |
2019-06-28 23:31:03 |
71.6.232.4 | attackspambots | scan r |
2019-06-29 00:06:32 |
194.190.39.50 | attackbotsspam | [portscan] Port scan |
2019-06-28 23:31:31 |
186.224.136.200 | attackspam | $f2bV_matches |
2019-06-28 23:44:59 |
5.55.104.239 | attack | Jun 28 15:48:21 server postfix/smtpd[11018]: NOQUEUE: reject: RCPT from ppp005055104239.access.hol.gr[5.55.104.239]: 554 5.7.1 Service unavailable; Client host [5.55.104.239] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/5.55.104.239; from= |
2019-06-29 00:14:48 |