City: unknown
Region: unknown
Country: Australia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 60.242.135.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59112
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;60.242.135.9. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 19:24:19 CST 2025
;; MSG SIZE rcvd: 105
9.135.242.60.in-addr.arpa domain name pointer 60-242-135-9.static.tpgi.com.au.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
9.135.242.60.in-addr.arpa name = 60-242-135-9.static.tpgi.com.au.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 173.236.149.184 | attackbots | MYH,DEF GET /wp-login.php GET /wp-login.php |
2020-02-07 14:18:23 |
| 122.54.106.62 | attack | 2020-02-07T04:55:54.809Z CLOSE host=122.54.106.62 port=53713 fd=4 time=20.014 bytes=25 ... |
2020-02-07 14:14:07 |
| 40.126.120.71 | attack | Feb 7 01:51:14 firewall sshd[25595]: Invalid user soy from 40.126.120.71 Feb 7 01:51:15 firewall sshd[25595]: Failed password for invalid user soy from 40.126.120.71 port 55174 ssh2 Feb 7 01:56:00 firewall sshd[25816]: Invalid user wto from 40.126.120.71 ... |
2020-02-07 13:45:39 |
| 47.63.80.5 | attackspambots | unauthorized connection attempt |
2020-02-07 13:44:37 |
| 123.143.203.194 | attackspam | unauthorized connection attempt |
2020-02-07 13:51:50 |
| 1.160.113.66 | attackspam | unauthorized connection attempt |
2020-02-07 13:48:20 |
| 110.49.71.249 | attack | Feb 6 18:52:25 hpm sshd\[15654\]: Invalid user jid from 110.49.71.249 Feb 6 18:52:25 hpm sshd\[15654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.71.249 Feb 6 18:52:27 hpm sshd\[15654\]: Failed password for invalid user jid from 110.49.71.249 port 12503 ssh2 Feb 6 18:55:54 hpm sshd\[16044\]: Invalid user qez from 110.49.71.249 Feb 6 18:55:54 hpm sshd\[16044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.71.249 |
2020-02-07 14:06:11 |
| 134.49.254.44 | attack | unauthorized connection attempt |
2020-02-07 13:45:02 |
| 185.40.50.131 | attack | unauthorized connection attempt |
2020-02-07 13:54:36 |
| 220.95.28.82 | attackspam | unauthorized connection attempt |
2020-02-07 13:41:08 |
| 153.139.239.41 | attackbotsspam | Feb 7 07:13:58 legacy sshd[25513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.139.239.41 Feb 7 07:13:59 legacy sshd[25513]: Failed password for invalid user rpi from 153.139.239.41 port 47566 ssh2 Feb 7 07:18:05 legacy sshd[25819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.139.239.41 ... |
2020-02-07 14:19:33 |
| 78.151.29.130 | attackspam | unauthorized connection attempt |
2020-02-07 14:07:27 |
| 189.114.57.194 | attack | unauthorized connection attempt |
2020-02-07 14:03:30 |
| 77.222.103.130 | attackbots | unauthorized connection attempt |
2020-02-07 14:08:00 |
| 75.4.214.93 | attackspam | unauthorized connection attempt |
2020-02-07 13:58:38 |