City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 60.85.60.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30699
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;60.85.60.139.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400
;; Query time: 132 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 02:46:54 CST 2025
;; MSG SIZE  rcvd: 105139.60.85.60.in-addr.arpa domain name pointer softbank060085060139.bbtec.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
139.60.85.60.in-addr.arpa	name = softbank060085060139.bbtec.net.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 92.253.24.168 | attackbots | Automatic report - Port Scan Attack | 2020-01-02 06:08:43 | 
| 49.212.183.253 | attack | Jan 1 17:17:20 dedicated sshd[14223]: Invalid user 1qaz2WSX_123 from 49.212.183.253 port 49744 | 2020-01-02 05:41:51 | 
| 34.67.108.17 | attackbotsspam | Jan 1 21:29:52 www sshd\[8159\]: Failed password for root from 34.67.108.17 port 57108 ssh2Jan 1 21:35:40 www sshd\[8180\]: Invalid user frens from 34.67.108.17Jan 1 21:35:42 www sshd\[8180\]: Failed password for invalid user frens from 34.67.108.17 port 57666 ssh2 ... | 2020-01-02 05:57:38 | 
| 78.94.204.238 | attackbotsspam | port scan and connect, tcp 80 (http) | 2020-01-02 06:03:18 | 
| 220.134.218.112 | attack | Jan 1 17:46:42 MK-Soft-VM7 sshd[19604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.218.112 Jan 1 17:46:44 MK-Soft-VM7 sshd[19604]: Failed password for invalid user stolze from 220.134.218.112 port 53812 ssh2 ... | 2020-01-02 05:35:55 | 
| 58.65.136.170 | attack | $f2bV_matches | 2020-01-02 05:33:01 | 
| 176.216.1.35 | attackbots | Unauthorized connection attempt detected from IP address 176.216.1.35 to port 25 | 2020-01-02 05:36:36 | 
| 85.209.0.243 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - | 2020-01-02 06:09:56 | 
| 45.32.118.90 | attackspambots | Portscan or hack attempt detected by psad/fwsnort | 2020-01-02 06:04:37 | 
| 185.53.88.3 | attackbotsspam | \[2020-01-01 16:53:30\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-01T16:53:30.318-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441613940821",SessionID="0x7f0fb4a5a908",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.3/62369",ACLName="no_extension_match" \[2020-01-01 16:53:31\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-01T16:53:31.135-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011442037694876",SessionID="0x7f0fb4a1daa8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.3/49726",ACLName="no_extension_match" \[2020-01-01 16:53:36\] SECURITY\[2857\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-01T16:53:36.651-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146812111747",SessionID="0x7f0fb4ca4128",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.3/58360",ACLName="no_extension | 2020-01-02 06:02:57 | 
| 31.168.216.43 | attackspambots | Automatic report - Port Scan Attack | 2020-01-02 05:52:10 | 
| 95.249.180.196 | attackbots | Lines containing failures of 95.249.180.196 Jan 1 14:56:08 shared10 sshd[26274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.249.180.196 user=mysql Jan 1 14:56:11 shared10 sshd[26274]: Failed password for mysql from 95.249.180.196 port 34826 ssh2 Jan 1 14:56:11 shared10 sshd[26274]: Received disconnect from 95.249.180.196 port 34826:11: Bye Bye [preauth] Jan 1 14:56:11 shared10 sshd[26274]: Disconnected from authenticating user mysql 95.249.180.196 port 34826 [preauth] Jan 1 15:15:26 shared10 sshd[671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.249.180.196 user=r.r Jan 1 15:15:29 shared10 sshd[671]: Failed password for r.r from 95.249.180.196 port 54356 ssh2 Jan 1 15:15:29 shared10 sshd[671]: Received disconnect from 95.249.180.196 port 54356:11: Bye Bye [preauth] Jan 1 15:15:29 shared10 sshd[671]: Disconnected from authenticating user r.r 95.249.180.196 port 54356 [........ ------------------------------ | 2020-01-02 05:48:57 | 
| 106.13.181.170 | attackbotsspam | Repeated brute force against a port | 2020-01-02 05:31:44 | 
| 190.129.47.148 | attackbots | Invalid user waitman from 190.129.47.148 port 48893 | 2020-01-02 05:53:43 | 
| 80.82.65.74 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 76 - port: 10082 proto: TCP cat: Misc Attack | 2020-01-02 05:35:28 |