City: unknown
Region: unknown
Country: Republic of China (ROC)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.124.13.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14169
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;140.124.13.105. IN A
;; AUTHORITY SECTION:
. 142 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:12:47 CST 2022
;; MSG SIZE rcvd: 107
Host 105.13.124.140.in-addr.arpa not found: 2(SERVFAIL)
b';; Truncated, retrying in TCP mode.
105.13.124.140.in-addr.arpa name = www.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = photolab4640.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = ixd.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = rdhd.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = eng.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = www.eecs-aischool.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = jgcampus.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = eecs-aischool.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = news.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = www-en.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = arch1.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = anniversary.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = cttl.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = moeoiac.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = rvrc.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = secc.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = demo.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = ecolife.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = servicecenter.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = isms.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = flexiblepacking.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = service.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = build.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = future-students.
105.13.124.140.in-addr.arpa name = emo.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = clc.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = utaemba.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = dns.rpage.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = first.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = rcec.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = newsletter.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = osausr.ntut.edu.tw.
105.13.124.140.in-addr.arpa name = ece.ntut.edu.tw.
Authoritative answers can be found from:
'
IP | Type | Details | Datetime |
---|---|---|---|
189.190.95.95 | attackspam | 2020-07-16T21:23:40.001385scmdmz1 sshd[17270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.190.95.95 2020-07-16T21:23:39.997368scmdmz1 sshd[17270]: Invalid user luser from 189.190.95.95 port 57432 2020-07-16T21:23:41.776444scmdmz1 sshd[17270]: Failed password for invalid user luser from 189.190.95.95 port 57432 ssh2 ... |
2020-07-17 03:43:36 |
65.50.209.87 | attack | 2020-07-16T21:40:12.113676snf-827550 sshd[25402]: Invalid user doku from 65.50.209.87 port 37098 2020-07-16T21:40:14.537884snf-827550 sshd[25402]: Failed password for invalid user doku from 65.50.209.87 port 37098 ssh2 2020-07-16T21:45:30.450289snf-827550 sshd[25423]: Invalid user gss from 65.50.209.87 port 39472 ... |
2020-07-17 04:06:48 |
212.174.0.211 | attackspam | Unauthorized connection attempt from IP address 212.174.0.211 on Port 445(SMB) |
2020-07-17 03:41:44 |
36.57.88.241 | attack | Jul 16 17:27:34 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 16 17:27:47 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 16 17:28:04 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 16 17:28:23 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 16 17:28:35 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-07-17 04:04:12 |
139.59.169.103 | attackspam | Jul 16 18:52:03 rocket sshd[11507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.103 Jul 16 18:52:05 rocket sshd[11507]: Failed password for invalid user duke from 139.59.169.103 port 50506 ssh2 Jul 16 18:56:22 rocket sshd[12055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.103 ... |
2020-07-17 04:01:55 |
60.167.182.147 | attack | Jul 16 15:44:08 game-panel sshd[8514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.182.147 Jul 16 15:44:10 game-panel sshd[8514]: Failed password for invalid user conrad from 60.167.182.147 port 44234 ssh2 Jul 16 15:49:45 game-panel sshd[8739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.182.147 |
2020-07-17 03:54:37 |
91.204.248.28 | attackspam | Tried sshing with brute force. |
2020-07-17 04:12:03 |
138.197.89.212 | attackspam |
|
2020-07-17 04:05:40 |
203.245.41.96 | attack | SSH Brute-Force reported by Fail2Ban |
2020-07-17 03:39:40 |
139.155.79.110 | attack | Jul 16 20:53:45 rocket sshd[29525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.79.110 Jul 16 20:53:47 rocket sshd[29525]: Failed password for invalid user hata from 139.155.79.110 port 56392 ssh2 Jul 16 21:01:09 rocket sshd[30978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.79.110 ... |
2020-07-17 04:07:28 |
217.92.210.164 | attackspam | (sshd) Failed SSH login from 217.92.210.164 (DE/Germany/pd95cd2a4.dip0.t-ipconnect.de): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 16 21:38:31 amsweb01 sshd[16166]: Invalid user jboss from 217.92.210.164 port 40304 Jul 16 21:38:32 amsweb01 sshd[16166]: Failed password for invalid user jboss from 217.92.210.164 port 40304 ssh2 Jul 16 21:44:49 amsweb01 sshd[17100]: Invalid user japon from 217.92.210.164 port 60330 Jul 16 21:44:52 amsweb01 sshd[17100]: Failed password for invalid user japon from 217.92.210.164 port 60330 ssh2 Jul 16 21:48:47 amsweb01 sshd[17751]: Invalid user mongo from 217.92.210.164 port 49494 |
2020-07-17 03:51:00 |
58.243.125.108 | attackbotsspam | Port Scan detected! ... |
2020-07-17 04:10:13 |
185.143.73.152 | attackspam | Jul 16 20:55:57 blackbee postfix/smtpd[1661]: warning: unknown[185.143.73.152]: SASL LOGIN authentication failed: authentication failure Jul 16 20:56:24 blackbee postfix/smtpd[1589]: warning: unknown[185.143.73.152]: SASL LOGIN authentication failed: authentication failure Jul 16 20:56:52 blackbee postfix/smtpd[1589]: warning: unknown[185.143.73.152]: SASL LOGIN authentication failed: authentication failure Jul 16 20:57:21 blackbee postfix/smtpd[1682]: warning: unknown[185.143.73.152]: SASL LOGIN authentication failed: authentication failure Jul 16 20:57:45 blackbee postfix/smtpd[1586]: warning: unknown[185.143.73.152]: SASL LOGIN authentication failed: authentication failure ... |
2020-07-17 03:59:19 |
45.225.160.235 | attackbotsspam | Jul 16 21:43:17 eventyay sshd[21077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.235 Jul 16 21:43:19 eventyay sshd[21077]: Failed password for invalid user teamspeak from 45.225.160.235 port 47540 ssh2 Jul 16 21:47:31 eventyay sshd[21271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.235 ... |
2020-07-17 04:06:08 |
213.43.97.20 | attackbotsspam | Unauthorized connection attempt detected from IP address 213.43.97.20 to port 23 |
2020-07-17 03:53:24 |