City: unknown
Region: unknown
Country: Japan
Internet Service Provider: SoftBank
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.112.245.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21566
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;218.112.245.148.		IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 23:45:54 CST 2025
;; MSG SIZE  rcvd: 108148.245.112.218.in-addr.arpa domain name pointer softbank218112245148.bbtec.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
148.245.112.218.in-addr.arpa	name = softbank218112245148.bbtec.net.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 185.39.11.39 | attackspam | Fail2Ban Ban Triggered | 2020-06-21 07:00:57 | 
| 49.235.28.195 | attackspam | SSH Brute Force | 2020-06-21 06:28:51 | 
| 223.171.32.55 | attack | Jun 21 00:17:46 OPSO sshd\[10130\]: Invalid user use from 223.171.32.55 port 51793 Jun 21 00:17:46 OPSO sshd\[10130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.55 Jun 21 00:17:48 OPSO sshd\[10130\]: Failed password for invalid user use from 223.171.32.55 port 51793 ssh2 Jun 21 00:18:02 OPSO sshd\[10132\]: Invalid user nano from 223.171.32.55 port 51794 Jun 21 00:18:02 OPSO sshd\[10132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.55 | 2020-06-21 06:30:46 | 
| 146.88.240.11 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 443 proto: TCP cat: Misc Attack | 2020-06-21 07:01:43 | 
| 92.249.143.164 | attackspambots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic | 2020-06-21 06:43:56 | 
| 45.134.179.243 | attack | 
 | 2020-06-21 06:53:13 | 
| 185.209.0.90 | attack | ET DROP Dshield Block Listed Source group 1 - port: 3400 proto: TCP cat: Misc Attack | 2020-06-21 06:58:17 | 
| 42.200.155.72 | attack | Invalid user c1 from 42.200.155.72 port 60070 | 2020-06-21 06:29:49 | 
| 212.39.64.65 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic | 2020-06-21 06:56:08 | 
| 71.228.61.137 | attack | Jun 20 23:38:27 mout sshd[11213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.228.61.137 user=pi Jun 20 23:38:29 mout sshd[11213]: Failed password for pi from 71.228.61.137 port 60032 ssh2 Jun 20 23:38:31 mout sshd[11213]: Connection closed by authenticating user pi 71.228.61.137 port 60032 [preauth] | 2020-06-21 06:27:23 | 
| 185.53.88.247 | attack | 
 | 2020-06-21 07:00:26 | 
| 185.200.118.77 | attackbotsspam | ET DROP Dshield Block Listed Source group 1 - port: 1080 proto: TCP cat: Misc Attack | 2020-06-21 06:58:42 | 
| 103.105.130.134 | attack | Invalid user security from 103.105.130.134 port 40160 | 2020-06-21 06:26:32 | 
| 46.101.33.198 | attackbots | 
 | 2020-06-21 06:51:41 | 
| 119.162.251.231 | attackspambots | SSH Invalid Login | 2020-06-21 06:23:29 |