City: Chushui
Region: Changhua
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.159.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.116.159.54. IN A
;; AUTHORITY SECTION:
. 445 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023051200 1800 900 604800 86400
;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 12 17:24:58 CST 2023
;; MSG SIZE rcvd: 107
Host 54.159.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 54.159.116.140.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
119.45.142.15 | attackbotsspam | Jun 8 05:15:10 zimbra sshd[5048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.142.15 user=r.r Jun 8 05:15:12 zimbra sshd[5048]: Failed password for r.r from 119.45.142.15 port 59904 ssh2 Jun 8 05:15:16 zimbra sshd[5048]: Received disconnect from 119.45.142.15 port 59904:11: Bye Bye [preauth] Jun 8 05:15:16 zimbra sshd[5048]: Disconnected from 119.45.142.15 port 59904 [preauth] Jun 8 05:37:58 zimbra sshd[23781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.45.142.15 user=r.r Jun 8 05:38:00 zimbra sshd[23781]: Failed password for r.r from 119.45.142.15 port 59488 ssh2 Jun 8 05:38:00 zimbra sshd[23781]: Received disconnect from 119.45.142.15 port 59488:11: Bye Bye [preauth] Jun 8 05:38:00 zimbra sshd[23781]: Disconnected from 119.45.142.15 port 59488 [preauth] Jun 8 05:43:09 zimbra sshd[28151]: Connection closed by 119.45.142.15 port 54628 [preauth] Jun 8 05:47:48 ........ ------------------------------- |
2020-06-09 06:31:43 |
36.89.157.197 | attackspam | no |
2020-06-09 06:30:43 |
107.180.120.57 | attack | 107.180.120.57 - - [08/Jun/2020:22:53:59 +0200] "POST /xmlrpc.php HTTP/1.1" 403 58203 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" 107.180.120.57 - - [08/Jun/2020:22:53:59 +0200] "POST /xmlrpc.php HTTP/1.1" 403 58353 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36" ... |
2020-06-09 07:02:03 |
206.189.199.48 | attack | Jun 8 15:18:09 dignus sshd[13879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.199.48 user=root Jun 8 15:18:11 dignus sshd[13879]: Failed password for root from 206.189.199.48 port 54364 ssh2 Jun 8 15:21:22 dignus sshd[14222]: Invalid user piotr from 206.189.199.48 port 55756 Jun 8 15:21:22 dignus sshd[14222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.199.48 Jun 8 15:21:24 dignus sshd[14222]: Failed password for invalid user piotr from 206.189.199.48 port 55756 ssh2 ... |
2020-06-09 06:33:55 |
182.61.133.172 | attackspam | Jun 9 03:24:28 itv-usvr-01 sshd[23068]: Invalid user teamspeak from 182.61.133.172 Jun 9 03:24:28 itv-usvr-01 sshd[23068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.133.172 Jun 9 03:24:28 itv-usvr-01 sshd[23068]: Invalid user teamspeak from 182.61.133.172 Jun 9 03:24:31 itv-usvr-01 sshd[23068]: Failed password for invalid user teamspeak from 182.61.133.172 port 41226 ssh2 |
2020-06-09 06:39:52 |
45.138.72.166 | attack | " " |
2020-06-09 06:45:21 |
77.40.2.104 | attack | 2020-06-08 dovecot_plain authenticator failed for \(localhost\) \[77.40.2.104\]: 535 Incorrect authentication data \(set_id=web@**REMOVED**.de\) 2020-06-08 dovecot_login authenticator failed for \(localhost\) \[77.40.2.104\]: 535 Incorrect authentication data \(set_id=web@**REMOVED**.de\) 2020-06-08 dovecot_plain authenticator failed for \(localhost\) \[77.40.2.104\]: 535 Incorrect authentication data \(set_id=spam@**REMOVED**.org\) |
2020-06-09 07:00:43 |
103.131.71.109 | attackspambots | (mod_security) mod_security (id:210730) triggered by 103.131.71.109 (VN/Vietnam/bot-103-131-71-109.coccoc.com): 5 in the last 3600 secs |
2020-06-09 06:37:18 |
122.51.72.30 | attackspambots | Failed password for invalid user yuk from 122.51.72.30 port 52240 ssh2 |
2020-06-09 06:38:23 |
222.186.15.115 | attackbotsspam | Jun 9 00:55:23 MainVPS sshd[4339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115 user=root Jun 9 00:55:25 MainVPS sshd[4339]: Failed password for root from 222.186.15.115 port 20840 ssh2 Jun 9 00:55:30 MainVPS sshd[4373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115 user=root Jun 9 00:55:32 MainVPS sshd[4373]: Failed password for root from 222.186.15.115 port 21601 ssh2 Jun 9 00:55:38 MainVPS sshd[4421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.115 user=root Jun 9 00:55:39 MainVPS sshd[4421]: Failed password for root from 222.186.15.115 port 20370 ssh2 ... |
2020-06-09 06:59:30 |
114.141.53.14 | attack | 20/6/8@16:24:10: FAIL: Alarm-Network address from=114.141.53.14 20/6/8@16:24:10: FAIL: Alarm-Network address from=114.141.53.14 ... |
2020-06-09 06:58:45 |
122.51.60.39 | attack | Jun 9 00:29:40 eventyay sshd[20577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.60.39 Jun 9 00:29:42 eventyay sshd[20577]: Failed password for invalid user gina from 122.51.60.39 port 45122 ssh2 Jun 9 00:34:03 eventyay sshd[20694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.60.39 ... |
2020-06-09 06:49:11 |
124.40.244.199 | attackbotsspam | Jun 8 14:15:05 server1 sshd\[805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.40.244.199 user=root Jun 8 14:15:07 server1 sshd\[805\]: Failed password for root from 124.40.244.199 port 40640 ssh2 Jun 8 14:24:26 server1 sshd\[3456\]: Invalid user jang from 124.40.244.199 Jun 8 14:24:26 server1 sshd\[3456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.40.244.199 Jun 8 14:24:28 server1 sshd\[3456\]: Failed password for invalid user jang from 124.40.244.199 port 39778 ssh2 ... |
2020-06-09 06:41:30 |
159.89.170.154 | attackspam | Jun 9 00:21:55 pkdns2 sshd\[36925\]: Invalid user alexander from 159.89.170.154Jun 9 00:21:57 pkdns2 sshd\[36925\]: Failed password for invalid user alexander from 159.89.170.154 port 50546 ssh2Jun 9 00:23:52 pkdns2 sshd\[37003\]: Failed password for root from 159.89.170.154 port 51806 ssh2Jun 9 00:25:47 pkdns2 sshd\[37123\]: Invalid user tester from 159.89.170.154Jun 9 00:25:50 pkdns2 sshd\[37123\]: Failed password for invalid user tester from 159.89.170.154 port 53070 ssh2Jun 9 00:27:42 pkdns2 sshd\[37224\]: Invalid user bphe from 159.89.170.154 ... |
2020-06-09 06:56:33 |
13.68.185.213 | attackspambots | Jun 8 22:20:23 rush sshd[16435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.185.213 Jun 8 22:20:25 rush sshd[16435]: Failed password for invalid user write from 13.68.185.213 port 53818 ssh2 Jun 8 22:24:30 rush sshd[16543]: Failed password for root from 13.68.185.213 port 35230 ssh2 ... |
2020-06-09 06:39:35 |