City: unknown
Region: unknown
Country: Japan
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.12.157.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8901
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;61.12.157.40. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025011301 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 14 13:22:59 CST 2025
;; MSG SIZE rcvd: 105
40.157.12.61.in-addr.arpa domain name pointer 40.157.12.61.ap.yournet.ne.jp.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
40.157.12.61.in-addr.arpa name = 40.157.12.61.ap.yournet.ne.jp.
Authoritative answers can be found from:
IP | Type | Details | Datetime |
---|---|---|---|
178.128.223.243 | attackspambots | 2019-10-05T20:34:47.417383shield sshd\[26381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.223.243 user=root 2019-10-05T20:34:49.977059shield sshd\[26381\]: Failed password for root from 178.128.223.243 port 56760 ssh2 2019-10-05T20:39:04.552575shield sshd\[26936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.223.243 user=root 2019-10-05T20:39:07.061832shield sshd\[26936\]: Failed password for root from 178.128.223.243 port 41558 ssh2 2019-10-05T20:43:23.955555shield sshd\[27481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.223.243 user=root |
2019-10-06 06:18:37 |
80.109.230.37 | attackbotsspam | 1 pkts, ports: UDP:1 |
2019-10-06 06:35:11 |
198.108.67.32 | attackspam | 1 pkts, ports: TCP:180 |
2019-10-06 06:43:34 |
107.173.145.168 | attack | Oct 5 22:55:17 legacy sshd[22170]: Failed password for root from 107.173.145.168 port 38126 ssh2 Oct 5 22:59:18 legacy sshd[22252]: Failed password for root from 107.173.145.168 port 49920 ssh2 ... |
2019-10-06 06:16:26 |
196.52.43.89 | attackbots | 1 pkts, ports: TCP:62078 |
2019-10-06 06:24:16 |
220.182.20.146 | attackspambots | 1 pkts, ports: TCP:445 |
2019-10-06 06:19:43 |
172.11.81.171 | attackbotsspam | 1 pkts, ports: UDP:1 |
2019-10-06 06:51:54 |
185.200.118.89 | attackspam | 1 pkts, ports: UDP:1194 |
2019-10-06 06:49:40 |
184.68.244.2 | attackspambots | 1 pkts, ports: TCP:20184 |
2019-10-06 06:26:35 |
102.158.218.126 | attackspambots | 1 pkts, ports: TCP:34567 |
2019-10-06 06:33:49 |
66.155.18.238 | attackbotsspam | 2019-10-05T21:52:48.100579shield sshd\[4388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.155.18.238 user=root 2019-10-05T21:52:49.947112shield sshd\[4388\]: Failed password for root from 66.155.18.238 port 53202 ssh2 2019-10-05T21:56:49.853077shield sshd\[5013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.155.18.238 user=root 2019-10-05T21:56:51.784814shield sshd\[5013\]: Failed password for root from 66.155.18.238 port 36612 ssh2 2019-10-05T22:00:51.380293shield sshd\[5583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.155.18.238 user=root |
2019-10-06 06:17:59 |
140.249.22.238 | attackspambots | Oct 5 16:49:44 dallas01 sshd[19870]: Failed password for root from 140.249.22.238 port 39734 ssh2 Oct 5 16:53:30 dallas01 sshd[20482]: Failed password for root from 140.249.22.238 port 44832 ssh2 |
2019-10-06 06:29:53 |
207.189.31.149 | attackbotsspam | 1 pkts, ports: TCP:445 |
2019-10-06 06:21:32 |
186.90.242.10 | attackspambots | 1 pkts, ports: TCP:37215 |
2019-10-06 06:48:55 |
196.52.43.110 | attackspam | 1 pkts, ports: TCP:1026 |
2019-10-06 06:23:37 |