City: unknown
Region: unknown
Country: Taiwan (Province of China)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.120.31.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28122
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.120.31.107. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 14:51:55 CST 2025
;; MSG SIZE rcvd: 107
107.31.120.140.in-addr.arpa domain name pointer iil.ee.nchu.edu.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
107.31.120.140.in-addr.arpa name = iil.ee.nchu.edu.tw.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 91.240.71.149 | attackbotsspam | Fail2Ban Ban Triggered HTTP SQL Injection Attempt |
2020-08-15 05:23:14 |
| 87.116.179.227 | attackbots | 87.116.179.227 - [15/Aug/2020:00:03:29 +0300] "POST /wp-login.php HTTP/1.1" 403 4030 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-" 87.116.179.227 - [15/Aug/2020:00:04:30 +0300] "POST /wp-login.php HTTP/1.1" 404 164 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-" 87.116.179.227 - [15/Aug/2020:00:05:31 +0300] "POST /wp-login.php HTTP/1.1" 404 164 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-" 87.116.179.227 - [15/Aug/2020:00:10:25 +0300] "POST /wp-login.php HTTP/1.1" 404 164 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-" 87.116.179.227 - [15/Aug/2020:00:11:25 +0300] "POST /wp-login.php HTTP/1.1" 404 164 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-" ... |
2020-08-15 05:23:31 |
| 222.186.169.194 | attackspambots | [MK-Root1] SSH login failed |
2020-08-15 05:26:03 |
| 13.114.122.76 | attackbots | REQUESTED PAGE: /.git/HEAD |
2020-08-15 05:36:25 |
| 49.88.112.71 | attack | 2020-08-14T21:52:26.358166shield sshd\[10389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71 user=root 2020-08-14T21:52:28.421193shield sshd\[10389\]: Failed password for root from 49.88.112.71 port 44431 ssh2 2020-08-14T21:52:31.016105shield sshd\[10389\]: Failed password for root from 49.88.112.71 port 44431 ssh2 2020-08-14T21:52:32.688004shield sshd\[10389\]: Failed password for root from 49.88.112.71 port 44431 ssh2 2020-08-14T21:53:22.232249shield sshd\[10463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71 user=root |
2020-08-15 05:54:10 |
| 103.129.223.98 | attack | 2020-08-14T21:38:17.965041shield sshd\[9090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.223.98 user=root 2020-08-14T21:38:19.477760shield sshd\[9090\]: Failed password for root from 103.129.223.98 port 54754 ssh2 2020-08-14T21:42:27.463723shield sshd\[9505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.223.98 user=root 2020-08-14T21:42:29.964791shield sshd\[9505\]: Failed password for root from 103.129.223.98 port 36432 ssh2 2020-08-14T21:46:45.983280shield sshd\[9943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.223.98 user=root |
2020-08-15 05:57:57 |
| 180.101.145.234 | attackspam | $f2bV_matches |
2020-08-15 05:21:44 |
| 113.88.165.169 | attackbotsspam | Aug 14 04:20:22 finn sshd[18711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.88.165.169 user=r.r Aug 14 04:20:25 finn sshd[18711]: Failed password for r.r from 113.88.165.169 port 36272 ssh2 Aug 14 04:20:25 finn sshd[18711]: Received disconnect from 113.88.165.169 port 36272:11: Bye Bye [preauth] Aug 14 04:20:25 finn sshd[18711]: Disconnected from 113.88.165.169 port 36272 [preauth] Aug 14 04:22:46 finn sshd[18804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.88.165.169 user=r.r Aug 14 04:22:48 finn sshd[18804]: Failed password for r.r from 113.88.165.169 port 58884 ssh2 Aug 14 04:22:49 finn sshd[18804]: Received disconnect from 113.88.165.169 port 58884:11: Bye Bye [preauth] Aug 14 04:22:49 finn sshd[18804]: Disconnected from 113.88.165.169 port 58884 [preauth] Aug 14 04:24:05 finn sshd[18831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh rus........ ------------------------------- |
2020-08-15 05:52:15 |
| 111.161.74.117 | attack | 2020-08-14T22:45:06.811492n23.at sshd[1907286]: Failed password for root from 111.161.74.117 port 43506 ssh2 2020-08-14T22:49:15.103233n23.at sshd[1909962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.161.74.117 user=root 2020-08-14T22:49:16.731627n23.at sshd[1909962]: Failed password for root from 111.161.74.117 port 48279 ssh2 ... |
2020-08-15 05:52:38 |
| 185.7.85.40 | attack | 1597437839 - 08/14/2020 22:43:59 Host: 185.7.85.40/185.7.85.40 Port: 23 TCP Blocked ... |
2020-08-15 05:42:20 |
| 188.166.244.184 | attackbots | Lines containing failures of 188.166.244.184 Aug 13 20:54:48 penfold sshd[7339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.244.184 user=r.r Aug 13 20:54:50 penfold sshd[7339]: Failed password for r.r from 188.166.244.184 port 51518 ssh2 Aug 13 20:54:52 penfold sshd[7339]: Received disconnect from 188.166.244.184 port 51518:11: Bye Bye [preauth] Aug 13 20:54:52 penfold sshd[7339]: Disconnected from authenticating user r.r 188.166.244.184 port 51518 [preauth] Aug 13 21:07:02 penfold sshd[8009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.244.184 user=r.r Aug 13 21:07:04 penfold sshd[8009]: Failed password for r.r from 188.166.244.184 port 33098 ssh2 Aug 13 21:07:04 penfold sshd[8009]: Received disconnect from 188.166.244.184 port 33098:11: Bye Bye [preauth] Aug 13 21:07:04 penfold sshd[8009]: Disconnected from authenticating user r.r 188.166.244.184 port 33098 [preau........ ------------------------------ |
2020-08-15 05:39:16 |
| 117.251.65.5 | attackspam | Port Scan detected! ... |
2020-08-15 05:58:40 |
| 62.122.156.74 | attackbotsspam | Aug 14 22:27:18 ns382633 sshd\[14069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.122.156.74 user=root Aug 14 22:27:19 ns382633 sshd\[14069\]: Failed password for root from 62.122.156.74 port 51936 ssh2 Aug 14 22:38:49 ns382633 sshd\[16044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.122.156.74 user=root Aug 14 22:38:51 ns382633 sshd\[16044\]: Failed password for root from 62.122.156.74 port 57094 ssh2 Aug 14 22:44:03 ns382633 sshd\[17068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.122.156.74 user=root |
2020-08-15 05:35:56 |
| 117.232.127.51 | attackbots | Aug 14 22:43:56 ns37 sshd[13931]: Failed password for root from 117.232.127.51 port 42874 ssh2 Aug 14 22:43:56 ns37 sshd[13931]: Failed password for root from 117.232.127.51 port 42874 ssh2 |
2020-08-15 05:44:32 |
| 106.54.139.117 | attackbotsspam | Aug 15 03:33:46 itv-usvr-01 sshd[19461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.139.117 user=root Aug 15 03:33:49 itv-usvr-01 sshd[19461]: Failed password for root from 106.54.139.117 port 33466 ssh2 Aug 15 03:39:47 itv-usvr-01 sshd[19854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.139.117 user=root Aug 15 03:39:49 itv-usvr-01 sshd[19854]: Failed password for root from 106.54.139.117 port 45596 ssh2 Aug 15 03:43:37 itv-usvr-01 sshd[19979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.139.117 user=root Aug 15 03:43:40 itv-usvr-01 sshd[19979]: Failed password for root from 106.54.139.117 port 59638 ssh2 |
2020-08-15 05:59:03 |