City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.29.16.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47540
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;221.29.16.100. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 22:46:13 CST 2025
;; MSG SIZE rcvd: 106
100.16.29.221.in-addr.arpa domain name pointer softbank221029016100.bbtec.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
100.16.29.221.in-addr.arpa name = softbank221029016100.bbtec.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 71.190.234.217 | attackspam | Unauthorized connection attempt detected from IP address 71.190.234.217 to port 2220 [J] |
2020-01-31 01:34:29 |
| 93.144.142.173 | attackspambots | Unauthorized connection attempt detected from IP address 93.144.142.173 to port 8080 [J] |
2020-01-31 01:31:26 |
| 79.119.20.87 | attackbots | Unauthorized connection attempt detected from IP address 79.119.20.87 to port 80 [J] |
2020-01-31 01:32:55 |
| 77.76.52.142 | attack | (sshd) Failed SSH login from 77.76.52.142 (BG/Bulgaria/77-76-52-142.ip.btc-net.bg): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan 30 15:35:37 andromeda sshd[7557]: Invalid user zaahid from 77.76.52.142 port 33488 Jan 30 15:35:39 andromeda sshd[7557]: Failed password for invalid user zaahid from 77.76.52.142 port 33488 ssh2 Jan 30 15:51:27 andromeda sshd[8243]: Invalid user gayak from 77.76.52.142 port 38912 |
2020-01-31 01:10:48 |
| 114.79.168.114 | attackbots | Unauthorized connection attempt detected from IP address 114.79.168.114 to port 1433 [J] |
2020-01-31 01:27:57 |
| 211.235.220.42 | attack | Unauthorized connection attempt detected from IP address 211.235.220.42 to port 5555 [J] |
2020-01-31 01:16:50 |
| 154.209.245.178 | attackspam | Unauthorized connection attempt detected from IP address 154.209.245.178 to port 2220 [J] |
2020-01-31 01:24:08 |
| 142.93.235.47 | attackspam | Unauthorized connection attempt detected from IP address 142.93.235.47 to port 2220 [J] |
2020-01-31 01:25:15 |
| 192.187.127.2 | attack | Unauthorized connection attempt detected from IP address 192.187.127.2 to port 80 [J] |
2020-01-31 01:40:40 |
| 222.186.30.187 | attackspambots | SSH Brute Force, server-1 sshd[5009]: Failed password for root from 222.186.30.187 port 44170 ssh2 |
2020-01-31 01:15:58 |
| 200.194.31.140 | attack | Unauthorized connection attempt detected from IP address 200.194.31.140 to port 23 [J] |
2020-01-31 01:18:46 |
| 95.215.163.108 | attack | Unauthorized connection attempt detected from IP address 95.215.163.108 to port 8080 [J] |
2020-01-31 01:31:02 |
| 124.41.214.191 | attackspam | Unauthorized connection attempt detected from IP address 124.41.214.191 to port 8080 [J] |
2020-01-31 01:26:17 |
| 41.39.89.95 | attackspambots | Unauthorized connection attempt detected from IP address 41.39.89.95 to port 2220 [J] |
2020-01-31 01:13:06 |
| 51.254.114.105 | attack | Unauthorized connection attempt detected from IP address 51.254.114.105 to port 2220 [J] |
2020-01-31 01:12:04 |