City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 60.66.2.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51835
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;60.66.2.42. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:28:50 CST 2025
;; MSG SIZE rcvd: 103
42.2.66.60.in-addr.arpa domain name pointer softbank060066002042.bbtec.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
42.2.66.60.in-addr.arpa name = softbank060066002042.bbtec.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.161.34.34 | attackbots | Unauthorized connection attempt detected from IP address 51.161.34.34 to port 22 [J] |
2020-03-03 09:18:11 |
| 186.188.228.161 | attackbotsspam | Honeypot attack, port: 5555, PTR: PTR record not found |
2020-03-03 09:25:49 |
| 137.74.171.160 | attackbotsspam | Mar 2 15:14:15 web1 sshd\[1317\]: Invalid user openerp from 137.74.171.160 Mar 2 15:14:15 web1 sshd\[1317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.171.160 Mar 2 15:14:17 web1 sshd\[1317\]: Failed password for invalid user openerp from 137.74.171.160 port 59700 ssh2 Mar 2 15:24:02 web1 sshd\[2207\]: Invalid user ftpuser from 137.74.171.160 Mar 2 15:24:02 web1 sshd\[2207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.171.160 |
2020-03-03 09:24:48 |
| 167.250.72.34 | attack | SSH attack |
2020-03-03 09:00:47 |
| 125.45.91.209 | attackspam | Unauthorized connection attempt detected from IP address 125.45.91.209 to port 23 [J] |
2020-03-03 08:52:52 |
| 41.77.146.98 | attackspam | Mar 3 00:11:57 vpn01 sshd[12910]: Failed password for root from 41.77.146.98 port 42186 ssh2 Mar 3 00:30:00 vpn01 sshd[13246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.77.146.98 ... |
2020-03-03 08:39:38 |
| 133.130.209.57 | attack | Blocked by UFW |
2020-03-03 09:06:33 |
| 220.134.11.45 | attackspambots | Unauthorized connection attempt detected from IP address 220.134.11.45 to port 81 [J] |
2020-03-03 09:14:47 |
| 222.186.175.23 | attackspam | Unauthorized connection attempt detected from IP address 222.186.175.23 to port 22 [J] |
2020-03-03 08:56:52 |
| 65.52.169.39 | attackbotsspam | Mar 3 01:36:09 server sshd[632390]: Failed password for invalid user teamspeak from 65.52.169.39 port 56826 ssh2 Mar 3 01:49:10 server sshd[635922]: Failed password for root from 65.52.169.39 port 38764 ssh2 Mar 3 02:02:03 server sshd[640911]: Failed password for invalid user adm from 65.52.169.39 port 48936 ssh2 |
2020-03-03 09:14:18 |
| 116.104.32.122 | attackbots | Unauthorized connection attempt detected from IP address 116.104.32.122 to port 23 [J] |
2020-03-03 08:55:44 |
| 96.84.177.225 | attackspam | Mar 3 05:39:20 webhost01 sshd[13983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.84.177.225 Mar 3 05:39:22 webhost01 sshd[13983]: Failed password for invalid user omn from 96.84.177.225 port 58626 ssh2 ... |
2020-03-03 08:58:44 |
| 210.48.146.61 | attackbots | Mar 3 01:54:34 web1 sshd\[4190\]: Invalid user ftpuser from 210.48.146.61 Mar 3 01:54:34 web1 sshd\[4190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.48.146.61 Mar 3 01:54:37 web1 sshd\[4190\]: Failed password for invalid user ftpuser from 210.48.146.61 port 49028 ssh2 Mar 3 01:58:28 web1 sshd\[4350\]: Invalid user www from 210.48.146.61 Mar 3 01:58:28 web1 sshd\[4350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.48.146.61 |
2020-03-03 09:23:46 |
| 113.125.102.61 | attackbots | (smtpauth) Failed SMTP AUTH login from 113.125.102.61 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-03-03 01:30:17 login authenticator failed for (ADMIN) [113.125.102.61]: 535 Incorrect authentication data (set_id=privacy@fpdamavand.com) |
2020-03-03 08:41:52 |
| 175.6.133.182 | attackspam | Mar 3 01:35:43 websrv1.aknwsrv.net postfix/smtpd[21910]: warning: unknown[175.6.133.182]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 3 01:35:50 websrv1.aknwsrv.net postfix/smtpd[21910]: warning: unknown[175.6.133.182]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Mar 3 01:36:01 websrv1.aknwsrv.net postfix/smtpd[21910]: warning: unknown[175.6.133.182]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2020-03-03 09:05:11 |