City: unknown
Region: unknown
Country: Taiwan (Province of China)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.81.248.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18482
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;219.81.248.193. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 11:31:06 CST 2025
;; MSG SIZE rcvd: 107
193.248.81.219.in-addr.arpa domain name pointer 219-81-248-193.static.tfn.net.tw.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
193.248.81.219.in-addr.arpa name = 219-81-248-193.static.tfn.net.tw.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 109.42.1.170 | attackbotsspam | May 1 13:47:41 [host] kernel: [4962588.839865] [U May 1 13:47:42 [host] kernel: [4962589.635216] [U May 1 13:47:43 [host] kernel: [4962590.635104] [U May 1 13:47:46 [host] kernel: [4962593.226625] [U May 1 13:47:47 [host] kernel: [4962594.226666] [U May 1 13:47:53 [host] kernel: [4962600.417413] [U |
2020-05-02 00:46:46 |
| 162.243.136.150 | attack | Hits on port : 435 |
2020-05-02 00:41:33 |
| 162.243.141.55 | attackspambots | trying to access non-authorized port |
2020-05-02 01:08:24 |
| 110.42.4.3 | attackspam | [Aegis] @ 2019-12-31 11:24:29 0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack |
2020-05-02 00:46:16 |
| 177.94.225.8 | attackspambots | Automatic report - Port Scan Attack |
2020-05-02 00:29:45 |
| 106.12.95.20 | attack | May 1 12:46:36 NPSTNNYC01T sshd[25506]: Failed password for root from 106.12.95.20 port 34934 ssh2 May 1 12:48:24 NPSTNNYC01T sshd[25670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.95.20 May 1 12:48:26 NPSTNNYC01T sshd[25670]: Failed password for invalid user virgilio from 106.12.95.20 port 53730 ssh2 ... |
2020-05-02 01:06:32 |
| 62.234.17.146 | attack | May 1 12:22:10 localhost sshd[98282]: Invalid user ex from 62.234.17.146 port 36316 May 1 12:22:10 localhost sshd[98282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.17.146 May 1 12:22:10 localhost sshd[98282]: Invalid user ex from 62.234.17.146 port 36316 May 1 12:22:12 localhost sshd[98282]: Failed password for invalid user ex from 62.234.17.146 port 36316 ssh2 May 1 12:27:54 localhost sshd[98930]: Invalid user ftpd from 62.234.17.146 port 41224 ... |
2020-05-02 01:09:44 |
| 185.50.149.17 | attackspambots | May 1 18:25:36 srv01 postfix/smtpd\[22209\]: warning: unknown\[185.50.149.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 1 18:25:54 srv01 postfix/smtpd\[14601\]: warning: unknown\[185.50.149.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 1 18:26:11 srv01 postfix/smtpd\[1024\]: warning: unknown\[185.50.149.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 1 18:26:28 srv01 postfix/smtpd\[22209\]: warning: unknown\[185.50.149.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 1 18:31:26 srv01 postfix/smtpd\[21610\]: warning: unknown\[185.50.149.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-05-02 00:34:14 |
| 79.147.26.211 | attackspam | sshd |
2020-05-02 01:05:23 |
| 213.14.183.183 | attack | 8080/tcp 8080/tcp [2020-04-29]2pkt |
2020-05-02 01:01:52 |
| 106.13.134.19 | attackspambots | May 1 13:38:17 ns392434 sshd[13174]: Invalid user pai from 106.13.134.19 port 34706 May 1 13:38:17 ns392434 sshd[13174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.134.19 May 1 13:38:17 ns392434 sshd[13174]: Invalid user pai from 106.13.134.19 port 34706 May 1 13:38:19 ns392434 sshd[13174]: Failed password for invalid user pai from 106.13.134.19 port 34706 ssh2 May 1 13:45:20 ns392434 sshd[13444]: Invalid user kalista from 106.13.134.19 port 45798 May 1 13:45:20 ns392434 sshd[13444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.134.19 May 1 13:45:20 ns392434 sshd[13444]: Invalid user kalista from 106.13.134.19 port 45798 May 1 13:45:22 ns392434 sshd[13444]: Failed password for invalid user kalista from 106.13.134.19 port 45798 ssh2 May 1 13:47:52 ns392434 sshd[13496]: Invalid user test_user from 106.13.134.19 port 43416 |
2020-05-02 00:47:01 |
| 51.91.157.101 | attackbots | May 2 00:05:51 webhost01 sshd[1502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.157.101 May 2 00:05:53 webhost01 sshd[1502]: Failed password for invalid user spc from 51.91.157.101 port 57498 ssh2 ... |
2020-05-02 01:10:21 |
| 87.251.74.246 | attackbotsspam | firewall-block, port(s): 2713/tcp, 7666/tcp, 8916/tcp, 11704/tcp, 12007/tcp, 14484/tcp, 15458/tcp, 28953/tcp, 32753/tcp, 59078/tcp, 62036/tcp |
2020-05-02 00:27:04 |
| 94.102.49.117 | attackspam | scan r |
2020-05-02 00:51:37 |
| 60.164.250.12 | attack | $f2bV_matches |
2020-05-02 00:57:08 |