City: unknown
Region: unknown
Country: China
Internet Service Provider: China Unicom
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.214.48.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6831
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;221.214.48.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025062201 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 23 02:40:53 CST 2025
;; MSG SIZE rcvd: 107
Host 242.48.214.221.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 242.48.214.221.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
42.117.20.32 | attackbots | Unauthorized connection attempt detected from IP address 42.117.20.32 to port 8081 [J] |
2020-01-31 00:50:28 |
3.135.20.228 | attack | Unauthorized connection attempt detected from IP address 3.135.20.228 to port 2220 [J] |
2020-01-31 00:32:01 |
77.76.52.142 | attack | (sshd) Failed SSH login from 77.76.52.142 (BG/Bulgaria/77-76-52-142.ip.btc-net.bg): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan 30 15:35:37 andromeda sshd[7557]: Invalid user zaahid from 77.76.52.142 port 33488 Jan 30 15:35:39 andromeda sshd[7557]: Failed password for invalid user zaahid from 77.76.52.142 port 33488 ssh2 Jan 30 15:51:27 andromeda sshd[8243]: Invalid user gayak from 77.76.52.142 port 38912 |
2020-01-31 01:10:48 |
124.156.241.168 | attack | Unauthorized connection attempt detected from IP address 124.156.241.168 to port 5222 [J] |
2020-01-31 00:41:01 |
89.31.110.68 | attackbots | Unauthorized connection attempt detected from IP address 89.31.110.68 to port 5555 [J] |
2020-01-31 00:47:20 |
217.182.70.125 | attack | Unauthorized connection attempt detected from IP address 217.182.70.125 to port 2220 [J] |
2020-01-31 00:33:03 |
91.215.244.12 | attackspambots | Unauthorized connection attempt detected from IP address 91.215.244.12 to port 2220 [J] |
2020-01-31 01:09:18 |
118.101.240.177 | attackspam | Honeypot attack, port: 81, PTR: PTR record not found |
2020-01-31 01:04:49 |
96.22.18.120 | attack | Unauthorized connection attempt detected from IP address 96.22.18.120 to port 81 [J] |
2020-01-31 01:08:36 |
201.238.154.174 | attack | Unauthorized connection attempt detected from IP address 201.238.154.174 to port 80 [J] |
2020-01-31 01:17:42 |
176.41.144.198 | attack | Unauthorized connection attempt detected from IP address 176.41.144.198 to port 8000 [J] |
2020-01-31 00:59:55 |
200.57.199.14 | attack | Unauthorized connection attempt detected from IP address 200.57.199.14 to port 23 [J] |
2020-01-31 00:55:02 |
151.80.153.174 | attackspambots | Jan 30 11:20:01 NPSTNNYC01T sshd[6879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.153.174 Jan 30 11:20:02 NPSTNNYC01T sshd[6879]: Failed password for invalid user scphost from 151.80.153.174 port 51254 ssh2 Jan 30 11:21:21 NPSTNNYC01T sshd[6904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.153.174 ... |
2020-01-31 00:39:07 |
185.79.242.54 | attackbotsspam | Unauthorized connection attempt detected from IP address 185.79.242.54 to port 23 [J] |
2020-01-31 00:36:45 |
118.70.123.224 | attackspambots | Unauthorized connection attempt detected from IP address 118.70.123.224 to port 23 [J] |
2020-01-31 01:05:05 |