City: unknown
Region: unknown
Country: Australia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 60.242.214.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;60.242.214.30. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 06:41:16 CST 2025
;; MSG SIZE rcvd: 106
30.214.242.60.in-addr.arpa domain name pointer 60-242-214-30.static.tpgi.com.au.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
30.214.242.60.in-addr.arpa name = 60-242-214-30.static.tpgi.com.au.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
41.44.207.131 | attack | DATE:2020-10-01 22:38:00, IP:41.44.207.131, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-10-02 17:17:17 |
91.229.112.17 | attackbots |
|
2020-10-02 17:08:46 |
192.38.134.175 | attack | This IP tried to get into my Facebook account. |
2020-10-02 16:53:43 |
181.48.120.220 | attack | Invalid user bugzilla from 181.48.120.220 port 57169 |
2020-10-02 17:03:03 |
178.128.233.69 | attack | SSH login attempts. |
2020-10-02 16:43:26 |
58.33.84.251 | attackbotsspam | Invalid user samba1 from 58.33.84.251 port 61653 |
2020-10-02 16:51:09 |
202.169.63.85 | attack | firewall-block, port(s): 8080/tcp |
2020-10-02 17:17:57 |
150.136.12.28 | attackbots | 2020-10-02T12:07:01.546169afi-git.jinr.ru sshd[12586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.12.28 2020-10-02T12:07:01.542155afi-git.jinr.ru sshd[12586]: Invalid user mark from 150.136.12.28 port 60012 2020-10-02T12:07:03.453574afi-git.jinr.ru sshd[12586]: Failed password for invalid user mark from 150.136.12.28 port 60012 ssh2 2020-10-02T12:10:51.464165afi-git.jinr.ru sshd[14158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.12.28 user=root 2020-10-02T12:10:53.946863afi-git.jinr.ru sshd[14158]: Failed password for root from 150.136.12.28 port 41158 ssh2 ... |
2020-10-02 17:15:05 |
106.53.68.158 | attackbots | $f2bV_matches |
2020-10-02 16:53:54 |
104.131.60.112 | attackspam | Port scan denied |
2020-10-02 17:07:22 |
124.70.66.245 | attack | [N10.H2.VM2] Port Scanner Detected Blocked by UFW |
2020-10-02 16:56:27 |
109.237.98.104 | attackbotsspam | SpamScore above: 10.0 |
2020-10-02 17:11:38 |
106.12.4.158 | attackspambots |
|
2020-10-02 17:10:32 |
106.75.231.227 | attackbotsspam | Oct 2 11:06:24 prox sshd[7125]: Failed password for root from 106.75.231.227 port 46118 ssh2 Oct 2 11:17:50 prox sshd[18365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.231.227 |
2020-10-02 17:20:32 |
51.77.146.156 | attackbotsspam | Invalid user jeremiah from 51.77.146.156 port 59778 |
2020-10-02 17:04:04 |