City: unknown
Region: unknown
Country: Taiwan (Province of China)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.204.124.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;203.204.124.61. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 22:28:16 CST 2025
;; MSG SIZE rcvd: 107
61.124.204.203.in-addr.arpa domain name pointer host-203-204-124-61.static.kbtelecom.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
61.124.204.203.in-addr.arpa name = host-203-204-124-61.static.kbtelecom.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 104.248.36.120 | attack | Port scan: Attack repeated for 24 hours |
2020-06-16 15:11:41 |
| 75.145.190.44 | attack | Port scan denied |
2020-06-16 15:10:44 |
| 111.230.175.183 | attackspambots | Invalid user wwwtest from 111.230.175.183 port 39246 |
2020-06-16 15:02:42 |
| 218.92.0.158 | attackspam | Jun 16 08:58:53 ns381471 sshd[9603]: Failed password for root from 218.92.0.158 port 25003 ssh2 Jun 16 08:59:07 ns381471 sshd[9603]: error: maximum authentication attempts exceeded for root from 218.92.0.158 port 25003 ssh2 [preauth] |
2020-06-16 15:19:43 |
| 178.238.226.43 | attackspam | email spam |
2020-06-16 14:58:01 |
| 186.235.22.242 | attack | Jun 16 05:41:05 mail.srvfarm.net postfix/smtps/smtpd[935106]: warning: 186-235-22-242.wiip.com.br[186.235.22.242]: SASL PLAIN authentication failed: Jun 16 05:41:05 mail.srvfarm.net postfix/smtps/smtpd[935106]: lost connection after AUTH from 186-235-22-242.wiip.com.br[186.235.22.242] Jun 16 05:41:30 mail.srvfarm.net postfix/smtps/smtpd[954624]: lost connection after CONNECT from 186-235-22-242.wiip.com.br[186.235.22.242] Jun 16 05:48:26 mail.srvfarm.net postfix/smtps/smtpd[936249]: warning: 186-235-22-242.wiip.com.br[186.235.22.242]: SASL PLAIN authentication failed: Jun 16 05:48:26 mail.srvfarm.net postfix/smtps/smtpd[936249]: lost connection after AUTH from 186-235-22-242.wiip.com.br[186.235.22.242] |
2020-06-16 15:21:58 |
| 45.122.220.157 | attack | GET /wp-login.php HTTP/1.1 |
2020-06-16 15:05:26 |
| 106.124.132.105 | attackspam | 2020-06-16T05:40:30.069629shield sshd\[13413\]: Invalid user cactiuser from 106.124.132.105 port 45290 2020-06-16T05:40:30.073325shield sshd\[13413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.132.105 2020-06-16T05:40:32.337862shield sshd\[13413\]: Failed password for invalid user cactiuser from 106.124.132.105 port 45290 ssh2 2020-06-16T05:44:22.116711shield sshd\[14470\]: Invalid user kj from 106.124.132.105 port 38054 2020-06-16T05:44:22.120908shield sshd\[14470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.132.105 |
2020-06-16 15:12:27 |
| 116.193.160.195 | attackspam | Jun 16 09:59:17 journals sshd\[101259\]: Invalid user musikbot from 116.193.160.195 Jun 16 09:59:17 journals sshd\[101259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.193.160.195 Jun 16 09:59:19 journals sshd\[101259\]: Failed password for invalid user musikbot from 116.193.160.195 port 45032 ssh2 Jun 16 10:03:17 journals sshd\[101857\]: Invalid user postgres from 116.193.160.195 Jun 16 10:03:17 journals sshd\[101857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.193.160.195 ... |
2020-06-16 15:04:50 |
| 171.25.193.20 | attackbotsspam | Jun 15 15:43:25 Ubuntu-1404-trusty-64-minimal sshd\[23496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.25.193.20 user=root Jun 15 15:43:26 Ubuntu-1404-trusty-64-minimal sshd\[23496\]: Failed password for root from 171.25.193.20 port 40804 ssh2 Jun 15 22:42:50 Ubuntu-1404-trusty-64-minimal sshd\[23538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.25.193.20 user=root Jun 15 22:42:51 Ubuntu-1404-trusty-64-minimal sshd\[23538\]: Failed password for root from 171.25.193.20 port 40861 ssh2 Jun 16 05:51:54 Ubuntu-1404-trusty-64-minimal sshd\[2779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.25.193.20 user=root |
2020-06-16 14:48:37 |
| 122.51.89.18 | attack | Jun 16 06:22:40 ns381471 sshd[26118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.89.18 Jun 16 06:22:42 ns381471 sshd[26118]: Failed password for invalid user dmi from 122.51.89.18 port 39494 ssh2 |
2020-06-16 14:52:59 |
| 167.71.134.241 | attackspam | Jun 16 08:28:36 ns41 sshd[4305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.134.241 |
2020-06-16 14:54:51 |
| 124.158.163.17 | attackbotsspam | Jun 16 05:50:13 vserver sshd\[7943\]: Invalid user wep from 124.158.163.17Jun 16 05:50:15 vserver sshd\[7943\]: Failed password for invalid user wep from 124.158.163.17 port 39422 ssh2Jun 16 05:51:51 vserver sshd\[7972\]: Invalid user postgres from 124.158.163.17Jun 16 05:51:53 vserver sshd\[7972\]: Failed password for invalid user postgres from 124.158.163.17 port 1186 ssh2 ... |
2020-06-16 14:49:20 |
| 190.2.211.18 | attackspambots | 5x Failed Password |
2020-06-16 14:54:14 |
| 139.215.208.125 | attackspam | Jun 16 05:51:48 mail sshd[11552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.208.125 Jun 16 05:51:50 mail sshd[11552]: Failed password for invalid user test from 139.215.208.125 port 52232 ssh2 ... |
2020-06-16 14:50:50 |