City: unknown
Region: unknown
Country: Republic of China (ROC)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.162.100.10
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58107
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;1.162.100.10.			IN	A
;; AUTHORITY SECTION:
.			211	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400
;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 11:26:51 CST 2022
;; MSG SIZE  rcvd: 10510.100.162.1.in-addr.arpa domain name pointer 1-162-100-10.dynamic-ip.hinet.net.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
10.100.162.1.in-addr.arpa	name = 1-162-100-10.dynamic-ip.hinet.net.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 84.17.46.21 | attackbotsspam | (From ompy50@hotmail.com) Sex dаting in Аustrаlia | Girls for seх in Аustralia: http://freeurlredirect.com/adultdating31944 | 2020-02-01 08:34:14 | 
| 198.98.50.192 | attackbotsspam | Feb 1 01:17:58 lukav-desktop sshd\[3178\]: Invalid user webadm from 198.98.50.192 Feb 1 01:17:58 lukav-desktop sshd\[3178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.50.192 Feb 1 01:18:00 lukav-desktop sshd\[3178\]: Failed password for invalid user webadm from 198.98.50.192 port 33904 ssh2 Feb 1 01:26:03 lukav-desktop sshd\[8433\]: Invalid user alexis from 198.98.50.192 Feb 1 01:26:03 lukav-desktop sshd\[8433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.50.192 | 2020-02-01 08:52:31 | 
| 142.93.196.133 | attackbotsspam | Unauthorized connection attempt detected from IP address 142.93.196.133 to port 2220 [J] | 2020-02-01 08:55:52 | 
| 188.166.246.46 | attackbots | Invalid user flora from 188.166.246.46 port 44738 | 2020-02-01 09:00:56 | 
| 190.28.108.152 | attackspambots | Unauthorized IMAP connection attempt | 2020-02-01 09:07:51 | 
| 222.186.180.142 | attackbotsspam | Unauthorized connection attempt detected from IP address 222.186.180.142 to port 22 [J] | 2020-02-01 08:43:08 | 
| 92.252.241.11 | attackbots | 92.252.241.11 has been banned for [spam] ... | 2020-02-01 08:41:14 | 
| 81.22.45.146 | attackspam | Unauthorized connection attempt from IP address 81.22.45.146 on Port 3389(RDP) | 2020-02-01 09:09:08 | 
| 122.55.79.153 | attack | Unauthorized connection attempt from IP address 122.55.79.153 on Port 445(SMB) | 2020-02-01 08:47:26 | 
| 34.89.111.21 | attackspambots | Feb 1 03:04:46 server sshd\[19888\]: Invalid user alex from 34.89.111.21 Feb 1 03:04:46 server sshd\[19888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=21.111.89.34.bc.googleusercontent.com Feb 1 03:04:48 server sshd\[19888\]: Failed password for invalid user alex from 34.89.111.21 port 53456 ssh2 Feb 1 03:26:29 server sshd\[24752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=21.111.89.34.bc.googleusercontent.com user=root Feb 1 03:26:31 server sshd\[24752\]: Failed password for root from 34.89.111.21 port 32786 ssh2 ... | 2020-02-01 08:49:00 | 
| 97.41.1.14 | attackspambots | 2020-01-31T14:32:29.104054linuxbox-skyline auth[29027]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=erikag rhost=97.41.1.14 ... | 2020-02-01 08:51:13 | 
| 178.62.36.116 | attackspambots | Unauthorized connection attempt detected from IP address 178.62.36.116 to port 2220 [J] | 2020-02-01 08:52:59 | 
| 5.189.154.15 | attack | Unauthorized connection attempt detected from IP address 5.189.154.15 to port 2220 [J] | 2020-02-01 08:31:43 | 
| 188.187.180.51 | attackbotsspam | Unauthorized connection attempt from IP address 188.187.180.51 on Port 445(SMB) | 2020-02-01 08:43:25 | 
| 5.248.20.133 | attack | Unauthorized connection attempt from IP address 5.248.20.133 on Port 445(SMB) | 2020-02-01 08:35:31 |