City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.239.149.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6394
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;42.239.149.124. IN A
;; AUTHORITY SECTION:
. 424 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400
;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 17:37:41 CST 2022
;; MSG SIZE rcvd: 107
124.149.239.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
124.149.239.42.in-addr.arpa name = hn.kd.ny.adsl.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 180.123.235.218 | attackspam | [portscan] tcp/23 [TELNET] *(RWIN=33112)(08281101) |
2020-08-28 20:05:40 |
| 185.220.102.6 | attackspam | [MK-VM6] SSH login failed |
2020-08-28 20:20:09 |
| 154.213.22.34 | attack | Aug 28 14:09:54 ns381471 sshd[11496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.213.22.34 Aug 28 14:09:56 ns381471 sshd[11496]: Failed password for invalid user md from 154.213.22.34 port 49828 ssh2 |
2020-08-28 20:22:51 |
| 188.166.6.130 | attack | 2020-08-28T14:09:50.882513+02:00 |
2020-08-28 20:10:23 |
| 71.6.232.4 | attackspambots | Honeypot hit. |
2020-08-28 20:21:38 |
| 64.227.37.93 | attackspam | B: f2b ssh aggressive 3x |
2020-08-28 20:35:44 |
| 64.227.25.8 | attackspam | Automatic Fail2ban report - Trying login SSH |
2020-08-28 20:16:51 |
| 205.251.136.39 | attackspambots | Brute forcing RDP port 3389 |
2020-08-28 20:31:33 |
| 202.70.136.218 | attackspam | 1433/tcp 445/tcp 445/tcp [2020-08-22/28]3pkt |
2020-08-28 20:06:07 |
| 103.122.94.86 | attackbotsspam | 6379/tcp 1521/tcp 8000/tcp... [2020-08-11/27]18pkt,13pt.(tcp),1tp.(icmp) |
2020-08-28 20:02:09 |
| 81.92.206.168 | attackbots | 0,45-01/02 [bc00/m50] PostRequest-Spammer scoring: Lusaka01 |
2020-08-28 20:36:32 |
| 187.1.81.161 | attack | Invalid user cdr from 187.1.81.161 port 38684 |
2020-08-28 20:03:17 |
| 81.219.95.138 | attackspam | Brute force attempt |
2020-08-28 19:57:33 |
| 218.92.0.138 | attack | Fail2Ban Ban Triggered |
2020-08-28 20:27:10 |
| 45.129.33.24 | attack | firewall-block, port(s): 21929/tcp, 21933/tcp, 21993/tcp, 22025/tcp, 22031/tcp, 22041/tcp, 22051/tcp, 22055/tcp, 22063/tcp |
2020-08-28 20:19:18 |