City: unknown
Region: unknown
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: National Sun Yat-sen University
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.18.31.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28867
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;163.18.31.112. IN A
;; AUTHORITY SECTION:
. 3600 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019052100 1800 900 604800 86400
;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue May 21 22:36:11 CST 2019
;; MSG SIZE rcvd: 117
112.31.18.163.in-addr.arpa domain name pointer 2b28.dorm1.nkfust.edu.tw.
Server: 67.207.67.2
Address: 67.207.67.2#53
Non-authoritative answer:
112.31.18.163.in-addr.arpa name = 2b28.dorm1.nkfust.edu.tw.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
73.153.208.110 | attackspam | Failed password for invalid user from 73.153.208.110 port 58836 ssh2 |
2020-07-07 08:48:57 |
125.227.11.17 | attack | firewall-block, port(s): 81/tcp |
2020-07-07 09:02:54 |
150.129.8.26 | attack | 2020-07-06 18:35:59.471332-0500 localhost sshd[29184]: Failed password for root from 150.129.8.26 port 58092 ssh2 |
2020-07-07 08:46:46 |
91.126.218.240 | attack | Unauthorized connection attempt from IP address 91.126.218.240 on Port 445(SMB) |
2020-07-07 08:52:30 |
178.21.164.90 | attackspambots | Fail2Ban Ban Triggered |
2020-07-07 08:54:09 |
81.224.225.186 | attackspambots | firewall-block, port(s): 5555/tcp |
2020-07-07 09:12:51 |
108.36.253.227 | attackspambots | SSH brute force |
2020-07-07 09:13:57 |
148.245.195.51 | attackbotsspam | firewall-block, port(s): 445/tcp |
2020-07-07 09:01:06 |
175.6.40.19 | attack | $f2bV_matches |
2020-07-07 08:50:10 |
120.92.11.9 | attack | Jul 7 03:19:09 pornomens sshd\[8285\]: Invalid user sysadmin from 120.92.11.9 port 54073 Jul 7 03:19:09 pornomens sshd\[8285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.11.9 Jul 7 03:19:11 pornomens sshd\[8285\]: Failed password for invalid user sysadmin from 120.92.11.9 port 54073 ssh2 ... |
2020-07-07 09:19:15 |
107.125.44.51 | attackbotsspam | This IP address tried 5 times in a row to hack our router. |
2020-07-07 08:57:40 |
181.234.229.73 | attackbots | Unauthorized connection attempt from IP address 181.234.229.73 on Port 445(SMB) |
2020-07-07 09:01:56 |
71.6.232.4 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 64 - port: 8080 proto: TCP cat: Misc Attack |
2020-07-07 09:16:44 |
59.126.125.219 | attackbots | port scan and connect, tcp 80 (http) |
2020-07-07 08:55:23 |
177.66.145.244 | attackspambots | Unauthorized connection attempt from IP address 177.66.145.244 on Port 445(SMB) |
2020-07-07 09:07:24 |