City: Tainan
Region: Tainan
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.41.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.116.41.21. IN A
;; AUTHORITY SECTION:
. 212 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2023050100 1800 900 604800 86400
;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 01 21:36:14 CST 2023
;; MSG SIZE rcvd: 106
Host 21.41.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 21.41.116.140.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
82.221.105.6 | attack | port scan and connect, tcp 1433 (ms-sql-s) |
2019-10-06 04:52:26 |
181.64.18.14 | attackbotsspam | Automatic report - Port Scan Attack |
2019-10-06 05:01:31 |
176.31.250.160 | attackbotsspam | Oct 5 16:35:04 ny01 sshd[5904]: Failed password for root from 176.31.250.160 port 48018 ssh2 Oct 5 16:39:12 ny01 sshd[6562]: Failed password for root from 176.31.250.160 port 59918 ssh2 |
2019-10-06 04:44:52 |
23.91.100.73 | attackspam | 2019-10-05T20:44:47.070029abusebot-6.cloudsearch.cf sshd\[19058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.91.100.73 user=root |
2019-10-06 04:45:23 |
119.29.52.46 | attackbotsspam | Oct 5 21:56:32 SilenceServices sshd[14789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.52.46 Oct 5 21:56:34 SilenceServices sshd[14789]: Failed password for invalid user Amor@321 from 119.29.52.46 port 60144 ssh2 Oct 5 21:59:41 SilenceServices sshd[16789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.52.46 |
2019-10-06 05:06:33 |
222.91.150.226 | attackspambots | Oct 5 23:34:45 microserver sshd[39275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.91.150.226 user=root Oct 5 23:34:48 microserver sshd[39275]: Failed password for root from 222.91.150.226 port 17288 ssh2 Oct 5 23:37:38 microserver sshd[39853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.91.150.226 user=root Oct 5 23:37:41 microserver sshd[39853]: Failed password for root from 222.91.150.226 port 17203 ssh2 Oct 5 23:40:34 microserver sshd[40441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.91.150.226 user=root Oct 5 23:53:21 microserver sshd[41993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.91.150.226 user=root Oct 5 23:53:23 microserver sshd[41993]: Failed password for root from 222.91.150.226 port 15427 ssh2 Oct 5 23:56:26 microserver sshd[42590]: pam_unix(sshd:auth): authentication failure; logname= uid |
2019-10-06 04:54:49 |
71.189.93.102 | attackbots | firewall-block, port(s): 5555/tcp |
2019-10-06 05:15:27 |
218.4.163.146 | attack | Oct 5 23:38:07 sauna sshd[178714]: Failed password for root from 218.4.163.146 port 57887 ssh2 ... |
2019-10-06 04:53:21 |
164.132.47.139 | attackspambots | $f2bV_matches |
2019-10-06 04:54:11 |
51.68.70.142 | attack | Oct 5 23:01:11 vps691689 sshd[25328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.70.142 Oct 5 23:01:12 vps691689 sshd[25328]: Failed password for invalid user 123 from 51.68.70.142 port 50226 ssh2 Oct 5 23:04:38 vps691689 sshd[25405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.70.142 ... |
2019-10-06 05:15:53 |
178.252.75.13 | attackspambots | postfix (unknown user, SPF fail or relay access denied) |
2019-10-06 04:57:04 |
188.214.104.146 | attackbots | Automatic report - Banned IP Access |
2019-10-06 04:49:26 |
209.94.195.212 | attack | 2019-10-05T23:15:05.248860tmaserv sshd\[28987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.94.195.212 2019-10-05T23:15:07.205964tmaserv sshd\[28987\]: Failed password for invalid user Haslo_1@3 from 209.94.195.212 port 33091 ssh2 2019-10-05T23:28:43.204373tmaserv sshd\[29869\]: Invalid user 7y8u9i0o from 209.94.195.212 port 14611 2019-10-05T23:28:43.208347tmaserv sshd\[29869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.94.195.212 2019-10-05T23:28:45.461974tmaserv sshd\[29869\]: Failed password for invalid user 7y8u9i0o from 209.94.195.212 port 14611 ssh2 2019-10-05T23:33:19.599035tmaserv sshd\[30113\]: Invalid user 123Johnny from 209.94.195.212 port 54741 ... |
2019-10-06 04:35:45 |
168.167.75.17 | attack | SSH Bruteforce attack |
2019-10-06 04:41:36 |
162.243.175.62 | attackbotsspam | Oct 5 10:37:51 eddieflores sshd\[31029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.175.62 user=root Oct 5 10:37:53 eddieflores sshd\[31029\]: Failed password for root from 162.243.175.62 port 34694 ssh2 Oct 5 10:42:02 eddieflores sshd\[31471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.175.62 user=root Oct 5 10:42:04 eddieflores sshd\[31471\]: Failed password for root from 162.243.175.62 port 48540 ssh2 Oct 5 10:46:14 eddieflores sshd\[31879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.175.62 user=root |
2019-10-06 04:59:26 |