City: Taipei
Region: Taipei
Country: Taiwan, China
Internet Service Provider: Chunghwa
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.141.85.35
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34888
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;220.141.85.35.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 17:43:39 CST 2025
;; MSG SIZE  rcvd: 106
        35.85.141.220.in-addr.arpa domain name pointer 220-141-85-35.dynamic-ip.hinet.net.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
35.85.141.220.in-addr.arpa	name = 220-141-85-35.dynamic-ip.hinet.net.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 36.37.226.39 | attack | Apr 2 23:26:47 124388 sshd[19983]: Failed password for invalid user shanhong from 36.37.226.39 port 58122 ssh2 Apr 2 23:31:08 124388 sshd[20068]: Invalid user sn from 36.37.226.39 port 41904 Apr 2 23:31:08 124388 sshd[20068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.37.226.39 Apr 2 23:31:08 124388 sshd[20068]: Invalid user sn from 36.37.226.39 port 41904 Apr 2 23:31:10 124388 sshd[20068]: Failed password for invalid user sn from 36.37.226.39 port 41904 ssh2  | 
                    2020-04-03 08:08:08 | 
| 104.227.139.186 | attackbotsspam | Invalid user wangruiyang from 104.227.139.186 port 50010  | 
                    2020-04-03 07:31:43 | 
| 114.119.165.38 | attackspambots | [Fri Apr 03 04:51:01.106940 2020] [:error] [pid 13418:tid 139715470677760] [client 114.119.165.38:17276] [client 114.119.165.38] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/prakiraan-iklim/agroklimatologi/kalender-tanam/1032-kalender-tanam-katam-terpadu-pulau-jawa/kalender-tanam-katam-terpadu-provinsi-jawa-timur/kalender-tanam-katam-terpadu-kabupaten-pacitan/kalender-tanam-katam-terpadu-kecamatan-punung-kabupaten ...  | 
                    2020-04-03 07:30:52 | 
| 180.247.25.44 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 02-04-2020 22:50:17.  | 
                    2020-04-03 08:05:23 | 
| 185.175.93.24 | attackbotsspam | Port scan: Attack repeated for 24 hours  | 
                    2020-04-03 08:10:16 | 
| 187.112.99.130 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 02-04-2020 22:50:17.  | 
                    2020-04-03 08:01:23 | 
| 45.74.18.12 | attackbots | Attempt to attack host OS, exploiting network vulnerabilities, on 02-04-2020 22:50:18.  | 
                    2020-04-03 08:01:00 | 
| 167.71.111.16 | attack | 167.71.111.16 - - [02/Apr/2020:23:50:39 +0200] "POST /wp-login.php HTTP/1.0" 200 2195 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 167.71.111.16 - - [02/Apr/2020:23:50:42 +0200] "POST /wp-login.php HTTP/1.0" 200 2184 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ...  | 
                    2020-04-03 07:42:15 | 
| 59.188.43.107 | attackspambots | 02.04.2020 23:50:31 - RDP Login Fail Detected by https://www.elinox.de/RDP-Wächter  | 
                    2020-04-03 07:59:26 | 
| 162.243.131.246 | attackspambots | " "  | 
                    2020-04-03 07:33:12 | 
| 178.128.217.58 | attack | Apr 3 00:25:51 vps sshd[553575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.58 user=root Apr 3 00:25:54 vps sshd[553575]: Failed password for root from 178.128.217.58 port 48100 ssh2 Apr 3 00:28:37 vps sshd[565748]: Invalid user jyh from 178.128.217.58 port 37370 Apr 3 00:28:37 vps sshd[565748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.58 Apr 3 00:28:39 vps sshd[565748]: Failed password for invalid user jyh from 178.128.217.58 port 37370 ssh2 ...  | 
                    2020-04-03 07:56:55 | 
| 134.209.182.198 | attack | Automatic report - SSH Brute-Force Attack  | 
                    2020-04-03 07:37:31 | 
| 45.133.99.8 | attackspam | 2020-04-03T00:42:49.375278l03.customhost.org.uk postfix/smtps/smtpd[29677]: warning: unknown[45.133.99.8]: SASL LOGIN authentication failed: authentication failure 2020-04-03T00:42:57.892678l03.customhost.org.uk postfix/smtps/smtpd[29677]: warning: unknown[45.133.99.8]: SASL LOGIN authentication failed: authentication failure 2020-04-03T00:48:59.631107l03.customhost.org.uk postfix/smtps/smtpd[30777]: warning: unknown[45.133.99.8]: SASL LOGIN authentication failed: authentication failure 2020-04-03T00:49:11.507243l03.customhost.org.uk postfix/smtps/smtpd[30777]: warning: unknown[45.133.99.8]: SASL LOGIN authentication failed: authentication failure ...  | 
                    2020-04-03 07:54:34 | 
| 183.193.234.158 | attackspambots | [portscan] Port scan  | 
                    2020-04-03 08:05:00 | 
| 102.134.147.61 | attackbotsspam | fail2ban  | 
                    2020-04-03 07:56:17 |