City: Taoyuan
Region: Taoyuan
Country: Taiwan, China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.192.116.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;192.192.116.139. IN A
;; AUTHORITY SECTION:
. 499 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2024053002 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 31 11:15:49 CST 2024
;; MSG SIZE rcvd: 108
b'Host 139.116.192.192.in-addr.arpa not found: 2(SERVFAIL)
'
server can't find 192.192.116.139.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
111.231.87.245 | attack | Invalid user guest from 111.231.87.245 port 50148 |
2020-05-29 15:36:11 |
81.10.27.247 | attackspambots | Automatic report - Banned IP Access |
2020-05-29 15:50:37 |
220.132.23.80 | attackspambots |
|
2020-05-29 15:22:45 |
14.190.240.60 | attackbots | (VN/Vietnam/-) SMTP Bruteforcing attempts |
2020-05-29 15:34:12 |
121.142.87.218 | attackspambots | (sshd) Failed SSH login from 121.142.87.218 (KR/South Korea/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 29 05:52:36 ubnt-55d23 sshd[24197]: Invalid user artur from 121.142.87.218 port 38374 May 29 05:52:38 ubnt-55d23 sshd[24197]: Failed password for invalid user artur from 121.142.87.218 port 38374 ssh2 |
2020-05-29 15:44:21 |
24.93.50.6 | attack | TOOK OVER DNS SERVERS VIA OPEN PORTS IN MY ROUTER. |
2020-05-29 15:47:01 |
138.197.163.11 | attack | SSH authentication failure x 6 reported by Fail2Ban ... |
2020-05-29 15:35:39 |
37.187.105.36 | attackspambots | Invalid user admin from 37.187.105.36 port 50990 |
2020-05-29 15:42:00 |
187.16.108.154 | attack | Invalid user osbash from 187.16.108.154 port 55576 |
2020-05-29 15:16:07 |
156.222.14.66 | attackbotsspam | (EG/Egypt/-) SMTP Bruteforcing attempts |
2020-05-29 15:17:50 |
106.52.57.120 | attackspam | Brute force attempt |
2020-05-29 15:26:33 |
188.217.243.160 | attackspam | Unauthorized connection attempt detected from IP address 188.217.243.160 to port 23 |
2020-05-29 15:49:46 |
193.169.212.107 | attack | SpamScore above: 10.0 |
2020-05-29 15:38:16 |
122.51.69.116 | attackspambots | May 29 08:38:51 ovpn sshd\[3884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.69.116 user=root May 29 08:38:53 ovpn sshd\[3884\]: Failed password for root from 122.51.69.116 port 60490 ssh2 May 29 08:58:45 ovpn sshd\[8770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.69.116 user=root May 29 08:58:46 ovpn sshd\[8770\]: Failed password for root from 122.51.69.116 port 53040 ssh2 May 29 09:01:43 ovpn sshd\[9518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.69.116 user=root |
2020-05-29 15:18:12 |
185.220.100.253 | attackbotsspam | $f2bV_matches |
2020-05-29 15:21:07 |