City: unknown
Region: unknown
Country: Australia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.192.142.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42449
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;0.192.142.127.			IN	A
;; AUTHORITY SECTION:
.			382	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 06:00:37 CST 2022
;; MSG SIZE  rcvd: 106
        Host 127.142.192.0.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 127.142.192.0.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 45.238.232.42 | attackbots | May 30 03:41:28 gw1 sshd[16755]: Failed password for root from 45.238.232.42 port 35704 ssh2 ...  | 
                    2020-05-30 07:21:15 | 
| 194.61.54.101 | attack | GET /wp-login.php GET /admin/index.php  | 
                    2020-05-30 07:07:00 | 
| 129.28.106.99 | attack | May 29 22:44:05 sso sshd[7851]: Failed password for root from 129.28.106.99 port 59974 ssh2 ...  | 
                    2020-05-30 07:08:53 | 
| 79.120.193.211 | attack | Invalid user byy from 79.120.193.211 port 65093  | 
                    2020-05-30 07:17:44 | 
| 104.160.34.166 | attackbotsspam | Invalid user sftptest from 104.160.34.166 port 58402  | 
                    2020-05-30 07:10:26 | 
| 162.243.137.118 | attackspambots | 2020-05-30 07:12:25 | |
| 129.204.5.153 | attackspam | Invalid user admin from 129.204.5.153 port 53424  | 
                    2020-05-30 07:10:49 | 
| 190.94.18.2 | attack | (sshd) Failed SSH login from 190.94.18.2 (DO/Dominican Republic/adsl-18-2.tricom.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 30 00:55:33 s1 sshd[30499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.94.18.2 user=root May 30 00:55:35 s1 sshd[30499]: Failed password for root from 190.94.18.2 port 37346 ssh2 May 30 01:12:07 s1 sshd[30859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.94.18.2 user=root May 30 01:12:10 s1 sshd[30859]: Failed password for root from 190.94.18.2 port 47412 ssh2 May 30 01:15:39 s1 sshd[30927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.94.18.2 user=root  | 
                    2020-05-30 06:58:05 | 
| 167.172.124.181 | attack | 82/tcp [2020-05-27/29]3pkt  | 
                    2020-05-30 06:50:41 | 
| 60.251.42.155 | attack | Invalid user pairault from 60.251.42.155 port 57410  | 
                    2020-05-30 06:54:44 | 
| 222.186.180.17 | attackbots | May 30 01:02:25 [host] sshd[20834]: pam_unix(sshd: May 30 01:02:28 [host] sshd[20834]: Failed passwor May 30 01:02:31 [host] sshd[20834]: Failed passwor  | 
                    2020-05-30 07:08:10 | 
| 222.186.190.2 | attackspambots | May 29 20:21:01 firewall sshd[21249]: Failed password for root from 222.186.190.2 port 47316 ssh2 May 29 20:21:04 firewall sshd[21249]: Failed password for root from 222.186.190.2 port 47316 ssh2 May 29 20:21:07 firewall sshd[21249]: Failed password for root from 222.186.190.2 port 47316 ssh2 ...  | 
                    2020-05-30 07:22:42 | 
| 112.85.42.178 | attackspam | May 30 00:38:53 mail sshd\[28216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.178 user=root May 30 00:38:55 mail sshd\[28216\]: Failed password for root from 112.85.42.178 port 49078 ssh2 May 30 00:38:58 mail sshd\[28216\]: Failed password for root from 112.85.42.178 port 49078 ssh2 May 30 00:39:02 mail sshd\[28216\]: Failed password for root from 112.85.42.178 port 49078 ssh2 May 30 00:39:05 mail sshd\[28216\]: Failed password for root from 112.85.42.178 port 49078 ssh2 ...  | 
                    2020-05-30 06:51:24 | 
| 43.227.67.215 | attack | Invalid user ntp from 43.227.67.215 port 37648  | 
                    2020-05-30 07:23:58 | 
| 101.89.197.232 | attack | Invalid user nelu from 101.89.197.232 port 39808  | 
                    2020-05-30 06:56:23 |