City: unknown
Region: unknown
Country: United Kingdom of Great Britain and Northern Ireland (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.16.89.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53757
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;92.16.89.129. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400
;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 20:48:41 CST 2025
;; MSG SIZE rcvd: 105
129.89.16.92.in-addr.arpa domain name pointer host-92-16-89-129.as13285.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
129.89.16.92.in-addr.arpa name = host-92-16-89-129.as13285.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 123.20.192.27 | attack | ip(123.20.192.27) FATAL: password authentication failed for user "postgres" |
2022-10-08 03:44:14 |
| 205.185.120.31 | botsattackproxy | 代理,攻击服务器 |
2022-11-06 15:04:14 |
| 222.92.117.182 | attack | Nov 7 02:03:21 host sshd[10583]: Invalid user client003 from 222.92.117.182 port 36294 Nov 7 02:03:21 host sshd[10589]: Invalid user client004 from 222.92.117.182 port 36374 Nov 7 02:03:21 host sshd[10598]: Invalid user client005 from 222.92.117.182 port 36528 |
2022-11-08 09:38:03 |
| 89.248.165.163 | attack | Attacks port |
2022-10-24 12:54:43 |
| 161.35.209.164 | attack | Oct 15 14:48:54 host sshd[15732]: Failed password for root from 161.35.209.164 port 32816 ssh2 Oct 15 14:48:54 host sshd[15737]: Failed password for root from 161.35.209.164 port 33220 ssh2 Oct 15 14:48:54 host sshd[15734]: Failed password for root from 161.35.209.164 port 32996 ssh2 |
2022-10-15 17:04:53 |
| 153.63.253.200 | spambotsattackproxynormal | Nice |
2022-10-18 07:38:04 |
| 157.245.133.2 | attack | Oct 6 06:25:35 ASUS sshd[4096]: Failed password for root from 157.245.133.2 port 51832 ssh2 Oct 6 06:25:35 ASUS sshd[4100]: Failed password for root from 157.245.133.2 port 51836 ssh2 |
2022-10-07 16:59:38 |
| 197.156.64.124 | normal | gujizone@gmail.com |
2022-10-13 21:51:50 |
| 203.0.113.42 | attack | Intercepting data |
2022-10-15 11:53:52 |
| 89.248.165.58 | attack | Port scan |
2022-10-25 12:55:17 |
| 178.128.196.240 | attack | Oct 7 00:38:36 host sshd[1622]: Invalid user wxz from 178.128.196.240 port 34968 Oct 7 00:38:36 host sshd[1615]: Invalid user wxy from 178.128.196.240 port 34478 Oct 7 00:38:36 host sshd[1614]: Invalid user wxy from 178.128.196.240 port 34594 |
2022-10-07 17:00:19 |
| 109.206.241.45 | attack | bit torrent exploit |
2022-10-29 03:57:28 |
| 90.151.171.109 | attack | trying to connect to closed ports |
2022-10-24 12:52:36 |
| 205.185.120.31 | botsattackproxy | 代理,攻击服务器 |
2022-11-06 15:04:18 |
| 103.218.27.171 | normal | mithumijanur099@gmail.com |
2022-10-27 23:42:37 |