City: Yangmei
Region: Taoyuan
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.115.50.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36253
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.115.50.2. IN A
;; AUTHORITY SECTION:
. 600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023050101 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 02 14:48:05 CST 2023
;; MSG SIZE rcvd: 105
2.50.115.140.in-addr.arpa domain name pointer NS2.CSIE.NCU.edu.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
2.50.115.140.in-addr.arpa name = NS2.CSIE.NCU.edu.tw.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
80.82.70.118 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 389 proto: tcp cat: Misc Attackbytes: 60 |
2020-09-14 00:31:21 |
104.140.188.18 | attack | Port Scan ... |
2020-09-14 00:33:14 |
5.132.115.161 | attack | Sep 13 17:25:00 rancher-0 sshd[25864]: Invalid user jenkins from 5.132.115.161 port 55224 ... |
2020-09-14 00:42:09 |
186.200.181.130 | attack | Sep 13 17:43:06 ns381471 sshd[31969]: Failed password for root from 186.200.181.130 port 60848 ssh2 |
2020-09-14 00:00:29 |
165.22.226.170 | attackbotsspam | Invalid user darel022 from 165.22.226.170 port 47888 |
2020-09-14 00:25:05 |
222.186.175.163 | attack | Sep 13 12:20:12 Tower sshd[6301]: Connection from 222.186.175.163 port 7264 on 192.168.10.220 port 22 rdomain "" Sep 13 12:20:13 Tower sshd[6301]: Failed password for root from 222.186.175.163 port 7264 ssh2 |
2020-09-14 00:28:24 |
27.7.177.15 | attackspam | 20/9/12@12:55:06: FAIL: Alarm-Telnet address from=27.7.177.15 ... |
2020-09-14 00:00:03 |
23.129.64.189 | attackspam | 2020-09-13T16:35[Censored Hostname] sshd[451]: Failed password for root from 23.129.64.189 port 60735 ssh2 2020-09-13T16:35[Censored Hostname] sshd[451]: Failed password for root from 23.129.64.189 port 60735 ssh2 2020-09-13T16:35[Censored Hostname] sshd[451]: Failed password for root from 23.129.64.189 port 60735 ssh2[...] |
2020-09-14 00:24:09 |
177.22.35.126 | attack | 177.22.35.126 (BR/Brazil/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 13 09:13:38 jbs1 sshd[8062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.249.11.57 user=root Sep 13 09:13:39 jbs1 sshd[8074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.62.103 user=root Sep 13 09:13:14 jbs1 sshd[7856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.22.35.126 user=root Sep 13 09:13:17 jbs1 sshd[7856]: Failed password for root from 177.22.35.126 port 31032 ssh2 Sep 13 09:12:48 jbs1 sshd[7654]: Failed password for root from 94.102.51.78 port 38901 ssh2 IP Addresses Blocked: 167.249.11.57 (PE/Peru/-) 165.227.62.103 (US/United States/-) |
2020-09-14 00:05:25 |
92.118.161.17 | attackbots | Port scan denied |
2020-09-14 00:22:28 |
193.169.255.46 | attack | Sep 13 16:18:25 ns308116 postfix/smtpd[748]: warning: unknown[193.169.255.46]: SASL LOGIN authentication failed: authentication failure Sep 13 16:18:25 ns308116 postfix/smtpd[748]: warning: unknown[193.169.255.46]: SASL LOGIN authentication failed: authentication failure Sep 13 16:18:25 ns308116 postfix/smtpd[651]: warning: unknown[193.169.255.46]: SASL LOGIN authentication failed: authentication failure Sep 13 16:18:25 ns308116 postfix/smtpd[651]: warning: unknown[193.169.255.46]: SASL LOGIN authentication failed: authentication failure Sep 13 16:18:25 ns308116 postfix/smtpd[1240]: warning: unknown[193.169.255.46]: SASL LOGIN authentication failed: authentication failure Sep 13 16:18:25 ns308116 postfix/smtpd[1240]: warning: unknown[193.169.255.46]: SASL LOGIN authentication failed: authentication failure ... |
2020-09-14 00:22:15 |
164.132.44.218 | attackspam | reported through recidive - multiple failed attempts(SSH) |
2020-09-14 00:40:50 |
49.232.172.20 | attackbotsspam | Sep 12 23:27:12 dignus sshd[28263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.172.20 user=root Sep 12 23:27:14 dignus sshd[28263]: Failed password for root from 49.232.172.20 port 34716 ssh2 Sep 12 23:32:53 dignus sshd[28677]: Invalid user bnq_ops from 49.232.172.20 port 37158 Sep 12 23:32:53 dignus sshd[28677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.172.20 Sep 12 23:32:55 dignus sshd[28677]: Failed password for invalid user bnq_ops from 49.232.172.20 port 37158 ssh2 ... |
2020-09-14 00:23:48 |
89.45.226.116 | attackbots | Sep 13 13:10:26 ns382633 sshd\[31721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.226.116 user=root Sep 13 13:10:29 ns382633 sshd\[31721\]: Failed password for root from 89.45.226.116 port 57134 ssh2 Sep 13 13:19:28 ns382633 sshd\[782\]: Invalid user s from 89.45.226.116 port 35346 Sep 13 13:19:28 ns382633 sshd\[782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.226.116 Sep 13 13:19:30 ns382633 sshd\[782\]: Failed password for invalid user s from 89.45.226.116 port 35346 ssh2 |
2020-09-14 00:40:28 |
5.9.97.200 | attackbots | 20 attempts against mh-misbehave-ban on lake |
2020-09-14 00:16:40 |