City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.80.140.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19596
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;58.80.140.159. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 10:37:13 CST 2025
;; MSG SIZE rcvd: 106
159.140.80.58.in-addr.arpa domain name pointer 58x80x140x159.ap58.ftth.ucom.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
159.140.80.58.in-addr.arpa name = 58x80x140x159.ap58.ftth.ucom.ne.jp.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
222.186.180.147 | attackspam | Feb 18 23:34:40 *host* sshd\[20923\]: Unable to negotiate with 222.186.180.147 port 13042: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\] |
2020-02-19 06:35:56 |
195.208.130.130 | attack | Unauthorised access (Feb 19) SRC=195.208.130.130 LEN=40 PREC=0x20 TTL=50 ID=4362 TCP DPT=23 WINDOW=1992 SYN |
2020-02-19 06:34:10 |
195.208.167.18 | attackspambots | Unauthorized connection attempt from IP address 195.208.167.18 on Port 445(SMB) |
2020-02-19 06:23:12 |
144.202.88.145 | attack | C1,WP GET /suche/wp-login.php |
2020-02-19 06:32:14 |
41.250.209.98 | attackbotsspam | scan z |
2020-02-19 06:35:33 |
106.12.55.131 | attack | Feb 18 12:24:44 web9 sshd\[17502\]: Invalid user speech-dispatcher from 106.12.55.131 Feb 18 12:24:44 web9 sshd\[17502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.55.131 Feb 18 12:24:46 web9 sshd\[17502\]: Failed password for invalid user speech-dispatcher from 106.12.55.131 port 47540 ssh2 Feb 18 12:26:03 web9 sshd\[17763\]: Invalid user amandabackup from 106.12.55.131 Feb 18 12:26:03 web9 sshd\[17763\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.55.131 |
2020-02-19 06:37:18 |
222.186.190.92 | attackbots | Feb 18 23:38:36 MK-Soft-Root2 sshd[3374]: Failed password for root from 222.186.190.92 port 16664 ssh2 Feb 18 23:38:41 MK-Soft-Root2 sshd[3374]: Failed password for root from 222.186.190.92 port 16664 ssh2 ... |
2020-02-19 06:40:50 |
187.189.10.16 | attackspambots | Unauthorized connection attempt from IP address 187.189.10.16 on Port 445(SMB) |
2020-02-19 06:56:13 |
49.88.112.114 | attackspam | Feb 18 12:23:51 web9 sshd\[17369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114 user=root Feb 18 12:23:53 web9 sshd\[17369\]: Failed password for root from 49.88.112.114 port 31511 ssh2 Feb 18 12:23:55 web9 sshd\[17369\]: Failed password for root from 49.88.112.114 port 31511 ssh2 Feb 18 12:27:15 web9 sshd\[17924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114 user=root Feb 18 12:27:17 web9 sshd\[17924\]: Failed password for root from 49.88.112.114 port 56427 ssh2 |
2020-02-19 06:27:25 |
189.212.113.74 | attackspambots | Automatic report - Port Scan Attack |
2020-02-19 06:49:30 |
1.175.157.42 | attack | TCP Port Scanning |
2020-02-19 06:54:08 |
178.46.215.24 | attackbotsspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-19 06:19:59 |
178.46.214.97 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2020-02-19 06:30:04 |
106.12.76.183 | attack | Feb 18 12:25:43 web9 sshd\[17716\]: Invalid user Ronald from 106.12.76.183 Feb 18 12:25:43 web9 sshd\[17716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.76.183 Feb 18 12:25:45 web9 sshd\[17716\]: Failed password for invalid user Ronald from 106.12.76.183 port 56680 ssh2 Feb 18 12:29:10 web9 sshd\[18218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.76.183 user=mysql Feb 18 12:29:12 web9 sshd\[18218\]: Failed password for mysql from 106.12.76.183 port 54242 ssh2 |
2020-02-19 06:51:13 |
139.59.188.207 | attack | Invalid user zhangjg from 139.59.188.207 port 45370 |
2020-02-19 06:45:40 |