City: unknown
Region: unknown
Country: Republic of China (ROC)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.112.150.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.112.150.189. IN A
;; AUTHORITY SECTION:
. 173 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 15:43:21 CST 2022
;; MSG SIZE rcvd: 108
189.150.112.140.in-addr.arpa domain name pointer ip150-189.vpnip.cc.ntu.edu.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
189.150.112.140.in-addr.arpa name = ip150-189.vpnip.cc.ntu.edu.tw.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 158.69.35.227 | attackspam | Tor exit node |
2020-05-28 06:23:16 |
| 181.40.122.2 | attackbotsspam | May 28 07:04:16 localhost sshd[2435351]: Invalid user webalizer from 181.40.122.2 port 20898 ... |
2020-05-28 06:27:51 |
| 199.195.250.29 | attack | Tor exit node |
2020-05-28 06:41:38 |
| 199.195.248.240 | attackspambots | Tor exit node |
2020-05-28 06:33:11 |
| 203.185.61.137 | attack | Invalid user vlc from 203.185.61.137 port 34008 |
2020-05-28 06:29:34 |
| 159.65.136.141 | attack | SSH Invalid Login |
2020-05-28 06:39:01 |
| 49.88.112.75 | attack | May 27 2020, 22:54:04 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban. |
2020-05-28 06:58:23 |
| 45.151.254.234 | attack | 1111/udp 2222/udp 3333/udp... [2020-03-27/05-27]195pkt,16pt.(tcp),20pt.(udp) |
2020-05-28 06:49:47 |
| 85.21.78.213 | attackbotsspam | May 27 17:03:26 mx sshd[20346]: Failed password for root from 85.21.78.213 port 57798 ssh2 |
2020-05-28 06:20:47 |
| 191.6.90.195 | attackbots | Email rejected due to spam filtering |
2020-05-28 06:30:27 |
| 73.15.91.251 | attackspambots | sshd jail - ssh hack attempt |
2020-05-28 06:37:36 |
| 178.59.96.141 | attack | $f2bV_matches |
2020-05-28 06:57:37 |
| 122.165.194.191 | attack | May 27 23:39:50 vpn01 sshd[537]: Failed password for root from 122.165.194.191 port 33804 ssh2 May 27 23:50:25 vpn01 sshd[696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.194.191 ... |
2020-05-28 06:46:52 |
| 62.110.66.66 | attackbots | Invalid user dsjtcg from 62.110.66.66 port 38986 |
2020-05-28 06:58:01 |
| 210.10.208.238 | attackbots | Invalid user cwq from 210.10.208.238 port 63526 |
2020-05-28 06:45:24 |