City: Taipei
Region: Taipei
Country: Taiwan, China
Internet Service Provider: Chunghwa
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.120.42.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32862
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;59.120.42.150.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 12:01:00 CST 2025
;; MSG SIZE  rcvd: 106150.42.120.59.in-addr.arpa domain name pointer 59-120-42-150.hinet-ip.hinet.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
150.42.120.59.in-addr.arpa	name = 59-120-42-150.hinet-ip.hinet.net.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 60.251.145.235 | attack | Honeypot attack, port: 445, PTR: 60-251-145-235.HINET-IP.hinet.net. | 2020-02-02 17:54:27 | 
| 201.28.39.6 | attackbots | Automatic report - XMLRPC Attack | 2020-02-02 17:35:54 | 
| 85.93.52.99 | attackspambots | Unauthorized connection attempt detected from IP address 85.93.52.99 to port 2220 [J] | 2020-02-02 18:06:31 | 
| 218.28.108.237 | attackspam | Feb 2 06:26:29 markkoudstaal sshd[26294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.108.237 Feb 2 06:26:31 markkoudstaal sshd[26294]: Failed password for invalid user user from 218.28.108.237 port 2980 ssh2 Feb 2 06:30:33 markkoudstaal sshd[27067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.108.237 | 2020-02-02 17:47:54 | 
| 116.103.140.138 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found | 2020-02-02 18:00:41 | 
| 190.248.94.98 | attackbots | Honeypot attack, port: 445, PTR: cable190-248-94-98.une.net.co. | 2020-02-02 17:46:24 | 
| 58.227.101.102 | attackspambots | unauthorized connection attempt | 2020-02-02 17:55:52 | 
| 49.255.20.158 | attackbots | Feb 2 09:47:06 web8 sshd\[3831\]: Invalid user tom from 49.255.20.158 Feb 2 09:47:06 web8 sshd\[3831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.255.20.158 Feb 2 09:47:08 web8 sshd\[3831\]: Failed password for invalid user tom from 49.255.20.158 port 1712 ssh2 Feb 2 09:50:29 web8 sshd\[5364\]: Invalid user user from 49.255.20.158 Feb 2 09:50:29 web8 sshd\[5364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.255.20.158 | 2020-02-02 18:01:01 | 
| 150.109.182.166 | attack | Unauthorized connection attempt detected from IP address 150.109.182.166 to port 902 [J] | 2020-02-02 17:45:17 | 
| 78.24.45.88 | attack | Honeypot attack, port: 445, PTR: pppoe-45-088.prtcom.ru. | 2020-02-02 17:34:09 | 
| 51.38.224.84 | attackbotsspam | 5x Failed Password | 2020-02-02 18:03:06 | 
| 171.88.46.173 | attackbots | CN China - Failures: 20 ftpd | 2020-02-02 18:13:45 | 
| 2a0c:de80:0:aaad::2 | attack | 20 attempts against mh_ha-misbehave-ban on lb | 2020-02-02 17:57:39 | 
| 185.143.221.55 | attack | unauthorized connection attempt | 2020-02-02 17:54:51 | 
| 51.254.123.127 | attackbotsspam | Unauthorized connection attempt detected from IP address 51.254.123.127 to port 2220 [J] | 2020-02-02 17:37:06 |