City: Tainan
Region: Tainan
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.164.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.116.164.129. IN A
;; AUTHORITY SECTION:
. 153 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023051600 1800 900 604800 86400
;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 16 17:10:30 CST 2023
;; MSG SIZE rcvd: 108
129.164.116.140.in-addr.arpa domain name pointer csyang.ee.ncku.edu.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
129.164.116.140.in-addr.arpa name = csyang.ee.ncku.edu.tw.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
121.134.159.21 | attack | Sep 22 22:31:37 php1 sshd\[19821\]: Invalid user bigdiawusr from 121.134.159.21 Sep 22 22:31:37 php1 sshd\[19821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21 Sep 22 22:31:39 php1 sshd\[19821\]: Failed password for invalid user bigdiawusr from 121.134.159.21 port 35130 ssh2 Sep 22 22:36:44 php1 sshd\[20385\]: Invalid user fox from 121.134.159.21 Sep 22 22:36:44 php1 sshd\[20385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.159.21 |
2019-09-23 20:11:18 |
45.55.6.105 | attackspam | Sep 23 14:03:14 localhost sshd\[26979\]: Invalid user tryton from 45.55.6.105 port 48836 Sep 23 14:03:14 localhost sshd\[26979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.6.105 Sep 23 14:03:15 localhost sshd\[26979\]: Failed password for invalid user tryton from 45.55.6.105 port 48836 ssh2 |
2019-09-23 20:05:04 |
149.28.122.159 | attack | Forbidden directory scan :: 2019/09/23 18:31:41 [error] 1103#1103: *86610 access forbidden by rule, client: 149.28.122.159, server: [censored_1], request: "GET /.../server-stuff/sql-query-find-invalid-email-addresses HTTP/1.1", host: "www.[censored_1]" |
2019-09-23 20:16:20 |
37.187.4.149 | attack | Sep 22 20:58:15 friendsofhawaii sshd\[2104\]: Invalid user heng from 37.187.4.149 Sep 22 20:58:15 friendsofhawaii sshd\[2104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3027327.ip-37-187-4.eu Sep 22 20:58:17 friendsofhawaii sshd\[2104\]: Failed password for invalid user heng from 37.187.4.149 port 37848 ssh2 Sep 22 21:02:44 friendsofhawaii sshd\[2452\]: Invalid user presta from 37.187.4.149 Sep 22 21:02:44 friendsofhawaii sshd\[2452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3027327.ip-37-187-4.eu |
2019-09-23 19:46:29 |
139.59.84.111 | attackbots | Sep 23 13:48:05 plex sshd[4602]: Invalid user ubuntu from 139.59.84.111 port 41170 |
2019-09-23 19:59:34 |
91.121.136.44 | attackbots | $f2bV_matches |
2019-09-23 20:00:55 |
60.250.23.233 | attack | Sep 23 13:44:48 saschabauer sshd[13659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.23.233 Sep 23 13:44:50 saschabauer sshd[13659]: Failed password for invalid user kp from 60.250.23.233 port 33529 ssh2 |
2019-09-23 20:10:32 |
198.228.145.150 | attackspam | Sep 23 11:04:08 eventyay sshd[14852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.228.145.150 Sep 23 11:04:09 eventyay sshd[14852]: Failed password for invalid user temp from 198.228.145.150 port 43588 ssh2 Sep 23 11:08:14 eventyay sshd[14926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.228.145.150 ... |
2019-09-23 19:53:10 |
218.92.0.156 | attack | Sep 23 09:26:44 dcd-gentoo sshd[2582]: User root from 218.92.0.156 not allowed because none of user's groups are listed in AllowGroups Sep 23 09:26:47 dcd-gentoo sshd[2582]: error: PAM: Authentication failure for illegal user root from 218.92.0.156 Sep 23 09:26:44 dcd-gentoo sshd[2582]: User root from 218.92.0.156 not allowed because none of user's groups are listed in AllowGroups Sep 23 09:26:47 dcd-gentoo sshd[2582]: error: PAM: Authentication failure for illegal user root from 218.92.0.156 Sep 23 09:26:44 dcd-gentoo sshd[2582]: User root from 218.92.0.156 not allowed because none of user's groups are listed in AllowGroups Sep 23 09:26:47 dcd-gentoo sshd[2582]: error: PAM: Authentication failure for illegal user root from 218.92.0.156 Sep 23 09:26:47 dcd-gentoo sshd[2582]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.156 port 45148 ssh2 ... |
2019-09-23 19:53:33 |
14.233.198.27 | attackspambots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/14.233.198.27/ VN - 1H : (62) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : VN NAME ASN : ASN45899 IP : 14.233.198.27 CIDR : 14.233.192.0/20 PREFIX COUNT : 2411 UNIQUE IP COUNT : 7209216 WYKRYTE ATAKI Z ASN45899 : 1H - 2 3H - 4 6H - 7 12H - 15 24H - 30 INFO : SERVER - ABB - Looking for resource vulnerabilities Detected and Blocked by ADMIN - data recovery |
2019-09-23 19:50:34 |
193.32.160.139 | attackbots | Sep 23 13:10:27 relay postfix/smtpd\[16114\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.139\]: 554 5.7.1 \ |
2019-09-23 19:48:47 |
89.221.250.18 | attackspam | Automatic report - Banned IP Access |
2019-09-23 20:03:33 |
118.238.25.69 | attackspam | 2019-09-23T07:53:36.5739051495-001 sshd\[43711\]: Invalid user mp from 118.238.25.69 port 56590 2019-09-23T07:53:36.5769611495-001 sshd\[43711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.238.25.69 2019-09-23T07:53:38.5900971495-001 sshd\[43711\]: Failed password for invalid user mp from 118.238.25.69 port 56590 ssh2 2019-09-23T07:58:37.8735651495-001 sshd\[44098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.238.25.69 user=root 2019-09-23T07:58:39.8769911495-001 sshd\[44098\]: Failed password for root from 118.238.25.69 port 49195 ssh2 2019-09-23T08:03:31.7167191495-001 sshd\[44449\]: Invalid user ey from 118.238.25.69 port 41798 2019-09-23T08:03:31.7245631495-001 sshd\[44449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.238.25.69 ... |
2019-09-23 20:23:00 |
163.172.50.34 | attackspam | Sep 23 08:12:21 isowiki sshd[8131]: Invalid user support from 163.172.50.34 Sep 23 08:12:21 isowiki sshd[8131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.50.34 Sep 23 08:12:22 isowiki sshd[8131]: Failed password for invalid user support from 163.172.50.34 port 35784 ssh2 Sep 23 08:36:29 isowiki sshd[8189]: Invalid user applvis from 163.172.50.34 Sep 23 08:36:29 isowiki sshd[8189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.50.34 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=163.172.50.34 |
2019-09-23 19:59:13 |
176.31.125.165 | attack | Sep 23 09:27:43 xeon sshd[36134]: Failed password for invalid user abdrani from 176.31.125.165 port 48444 ssh2 |
2019-09-23 19:44:59 |