City: Ho Chi Minh City
Region: Ho Chi Minh
Country: Vietnam
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.168.103.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52457
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;14.168.103.234. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025070601 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jul 07 06:25:45 CST 2025
;; MSG SIZE rcvd: 107
234.103.168.14.in-addr.arpa domain name pointer static.vnpt.vn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
234.103.168.14.in-addr.arpa name = static.vnpt.vn.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
51.254.207.92 | attack | Banned for a week because repeated abuses, for example SSH, but not only |
2020-07-27 03:44:13 |
172.245.181.219 | attackbotsspam | (From kim@10xsuperstar.com) Hi, I was just on your site oakleaffamilychiropractic.net and I like it very much. We are looking for a small selected group of VIP partners, to buy email advertising from on a long-term monthly basis. I think oakleaffamilychiropractic.net will be a good match. This can be a nice income boost for you. Coming in every month... Interested? Click the link below and enter your email. https://10xsuperstar.com/go/m/ I will be in touch... Thank you, Kim |
2020-07-27 03:51:12 |
103.79.165.33 | attack | SMB Server BruteForce Attack |
2020-07-27 03:31:24 |
159.89.196.75 | attackspambots | Jul 26 18:53:39 ws26vmsma01 sshd[206496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.196.75 Jul 26 18:53:42 ws26vmsma01 sshd[206496]: Failed password for invalid user csserver from 159.89.196.75 port 37026 ssh2 ... |
2020-07-27 03:39:21 |
129.204.65.174 | attackspambots | Invalid user invite from 129.204.65.174 port 60946 |
2020-07-27 03:47:14 |
68.183.92.52 | attackspambots | Jul 26 17:59:01 XXXXXX sshd[62026]: Invalid user babli from 68.183.92.52 port 51898 |
2020-07-27 04:04:52 |
223.247.218.112 | attackspam | Failed password for invalid user vcs from 223.247.218.112 port 59563 ssh2 |
2020-07-27 03:58:31 |
121.46.244.194 | attackspam | 20 attempts against mh-ssh on cloud |
2020-07-27 03:49:30 |
201.231.115.87 | attackbots | Jul 26 14:02:46 plex-server sshd[3401006]: Invalid user priya from 201.231.115.87 port 30081 Jul 26 14:02:46 plex-server sshd[3401006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.231.115.87 Jul 26 14:02:46 plex-server sshd[3401006]: Invalid user priya from 201.231.115.87 port 30081 Jul 26 14:02:49 plex-server sshd[3401006]: Failed password for invalid user priya from 201.231.115.87 port 30081 ssh2 Jul 26 14:04:38 plex-server sshd[3402460]: Invalid user ftp from 201.231.115.87 port 39489 ... |
2020-07-27 03:45:12 |
177.39.218.141 | attackspambots | Unauthorized connection attempt from IP address 177.39.218.141 on Port 445(SMB) |
2020-07-27 04:02:29 |
178.46.213.9 | attackspam | Jul 26 15:13:19 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=178.46.213.9 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=57472 PROTO=TCP SPT=3201 DPT=23 WINDOW=1799 RES=0x00 SYN URGP=0 Jul 26 15:13:19 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=178.46.213.9 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=57472 PROTO=TCP SPT=3201 DPT=23 WINDOW=1799 RES=0x00 SYN URGP=0 Jul 26 15:13:20 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=178.46.213.9 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=57472 PROTO=TCP SPT=3201 DPT=23 WINDOW=1799 RES=0x00 SYN URGP=0 Jul 26 15:13:20 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=178.46.213.9 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=56 ID=57472 PROTO=TCP SPT=3201 DPT=23 WINDOW=1799 RES=0x00 SYN URGP=0 Jul 26 15:31:36 *hidden* kernel: [UFW BLOCK] IN= ... |
2020-07-27 04:03:10 |
103.54.202.221 | attack | Automatic report - Port Scan Attack |
2020-07-27 03:52:08 |
196.219.66.215 | attackbotsspam | Port probing on unauthorized port 445 |
2020-07-27 03:49:13 |
14.247.239.122 | attack | Unauthorized connection attempt from IP address 14.247.239.122 on Port 445(SMB) |
2020-07-27 03:48:30 |
107.174.66.229 | attackspambots | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-07-27 03:58:02 |