City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.202.242.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6873
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;126.202.242.141. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 15:43:20 CST 2025
;; MSG SIZE rcvd: 108
141.242.202.126.in-addr.arpa domain name pointer softbank126202242141.bbtec.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
141.242.202.126.in-addr.arpa name = softbank126202242141.bbtec.net.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
200.100.60.3 | attackspam | Port Scan: TCP/8080 |
2019-09-10 17:37:33 |
185.169.199.130 | attack | Port Scan: TCP/15669 |
2019-09-10 18:07:14 |
96.44.135.125 | attackspambots | Port Scan: TCP/443 |
2019-09-10 17:28:40 |
123.151.34.210 | attackbots | Port Scan: UDP/49153 |
2019-09-10 17:26:46 |
196.52.43.97 | attackspam | Port Scan: TCP/3052 |
2019-09-10 18:05:57 |
113.89.40.218 | attack | Port Scan: TCP/445 |
2019-09-10 17:48:37 |
138.122.97.119 | attackspambots | Port Scan: TCP/445 |
2019-09-10 17:46:29 |
134.209.78.43 | attackbotsspam | Sep 10 04:51:56 ny01 sshd[9977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.78.43 Sep 10 04:51:58 ny01 sshd[9977]: Failed password for invalid user qwe1 from 134.209.78.43 port 42608 ssh2 Sep 10 04:58:07 ny01 sshd[11561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.78.43 |
2019-09-10 17:06:36 |
92.119.160.143 | attack | 09/10/2019-05:06:26.544532 92.119.160.143 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-09-10 17:51:49 |
14.147.106.202 | attack | Port Scan: TCP/22 |
2019-09-10 17:34:32 |
61.224.190.49 | attack | Port Scan: TCP/21 |
2019-09-10 17:56:49 |
189.69.104.139 | attackspam | Sep 10 11:03:13 vps01 sshd[29882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.69.104.139 Sep 10 11:03:15 vps01 sshd[29882]: Failed password for invalid user admin from 189.69.104.139 port 37750 ssh2 |
2019-09-10 17:05:08 |
50.203.120.18 | attackbotsspam | Port Scan: UDP/137 |
2019-09-10 17:58:09 |
151.41.105.234 | attackspam | Port Scan: TCP/9090 |
2019-09-10 17:45:25 |
220.198.69.93 | attack | [portscan] tcp/23 [TELNET] *(RWIN=53210)(09101037) |
2019-09-10 18:02:52 |