City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.34.153.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19225
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;100.34.153.243.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 19:52:12 CST 2025
;; MSG SIZE  rcvd: 107
        243.153.34.100.in-addr.arpa domain name pointer pool-100-34-153-243.phlapa.fios.verizon.net.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
243.153.34.100.in-addr.arpa	name = pool-100-34-153-243.phlapa.fios.verizon.net.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 177.91.188.12 | attackbots | 9-8-2020 22:13:51 Unauthorized connection attempt (Brute-Force). 9-8-2020 22:13:51 Connection from IP address: 177.91.188.12 on port: 587 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=177.91.188.12  | 
                    2020-08-10 08:08:25 | 
| 71.93.184.42 | attackbotsspam | Brute force 51 attempts  | 
                    2020-08-10 08:14:45 | 
| 80.53.156.62 | attack | Aug 9 22:14:33 sshgateway sshd\[23704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=zy62.internetdsl.tpnet.pl user=root Aug 9 22:14:35 sshgateway sshd\[23704\]: Failed password for root from 80.53.156.62 port 49520 ssh2 Aug 9 22:22:38 sshgateway sshd\[23759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=zy62.internetdsl.tpnet.pl user=root  | 
                    2020-08-10 07:47:52 | 
| 212.47.229.4 | attackbots | Tried sshing with brute force.  | 
                    2020-08-10 08:10:24 | 
| 171.25.209.203 | attackspambots | "fail2ban match"  | 
                    2020-08-10 07:55:13 | 
| 212.129.152.27 | attackbotsspam | frenzy  | 
                    2020-08-10 08:15:52 | 
| 106.52.105.238 | attackbots | 20/8/9@17:02:36: FAIL: Alarm-Network address from=106.52.105.238 ...  | 
                    2020-08-10 07:52:15 | 
| 49.88.112.70 | attackspambots | SSH auth scanning - multiple failed logins  | 
                    2020-08-10 07:55:36 | 
| 103.133.109.116 | attackbotsspam | [MK-VM4] Blocked by UFW  | 
                    2020-08-10 08:13:17 | 
| 106.245.217.25 | attackspam | prod8 ...  | 
                    2020-08-10 07:43:48 | 
| 49.234.226.13 | attackspambots | SSH Brute-Forcing (server2)  | 
                    2020-08-10 08:11:34 | 
| 195.54.160.180 | attackspam | Scanned 27 times in the last 24 hours on port 22  | 
                    2020-08-10 08:07:29 | 
| 122.51.80.81 | attackspambots | $f2bV_matches  | 
                    2020-08-10 08:09:29 | 
| 107.158.89.124 | attack | Received: from mail.hedumbletonicly.icu (unknown [107.158.89.124]) Date: Sun, 9 Aug 2020 15:50:15 -0400 From: "Blaux Dont Sweat"  | 
                    2020-08-10 07:54:09 | 
| 219.142.146.226 | attack | Aug 9 22:02:28 h2034429 sshd[30255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.142.146.226 user=r.r Aug 9 22:02:44 h2034429 sshd[30255]: Failed password for r.r from 219.142.146.226 port 55106 ssh2 Aug 9 22:02:44 h2034429 sshd[30255]: Received disconnect from 219.142.146.226 port 55106:11: Bye Bye [preauth] Aug 9 22:02:44 h2034429 sshd[30255]: Disconnected from 219.142.146.226 port 55106 [preauth] Aug 9 22:04:40 h2034429 sshd[30291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.142.146.226 user=r.r Aug 9 22:04:42 h2034429 sshd[30291]: Failed password for r.r from 219.142.146.226 port 55387 ssh2 Aug 9 22:04:42 h2034429 sshd[30291]: Received disconnect from 219.142.146.226 port 55387:11: Bye Bye [preauth] Aug 9 22:04:42 h2034429 sshd[30291]: Disconnected from 219.142.146.226 port 55387 [preauth] Aug 9 22:06:52 h2034429 sshd[30346]: pam_unix(sshd:auth): authenticatio........ -------------------------------  | 
                    2020-08-10 07:58:55 |