City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.0.79.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43456
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;101.0.79.130.			IN	A
;; AUTHORITY SECTION:
.			476	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 05 01:05:20 CST 2022
;; MSG SIZE  rcvd: 105
        130.79.0.101.in-addr.arpa domain name pointer 130.79.0.101.static.smartservers.com.au.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
130.79.0.101.in-addr.arpa	name = 130.79.0.101.static.smartservers.com.au.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 193.165.247.107 | attackbotsspam | firewall-block, port(s): 23/tcp  | 
                    2019-09-30 19:40:40 | 
| 139.59.41.154 | attackbotsspam | Sep 30 13:51:35 pkdns2 sshd\[35055\]: Invalid user TeamSpeak from 139.59.41.154Sep 30 13:51:37 pkdns2 sshd\[35055\]: Failed password for invalid user TeamSpeak from 139.59.41.154 port 34976 ssh2Sep 30 13:56:34 pkdns2 sshd\[35253\]: Invalid user test from 139.59.41.154Sep 30 13:56:37 pkdns2 sshd\[35253\]: Failed password for invalid user test from 139.59.41.154 port 34048 ssh2Sep 30 14:01:22 pkdns2 sshd\[35463\]: Invalid user admin from 139.59.41.154Sep 30 14:01:24 pkdns2 sshd\[35463\]: Failed password for invalid user admin from 139.59.41.154 port 59042 ssh2 ...  | 
                    2019-09-30 19:12:38 | 
| 106.57.193.22 | attackspam | Telnet Server BruteForce Attack  | 
                    2019-09-30 19:14:25 | 
| 106.12.78.199 | attack | Sep 30 11:25:48 [munged] sshd[19813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.78.199  | 
                    2019-09-30 19:02:52 | 
| 82.232.32.214 | attackbotsspam | Total attacks: 2  | 
                    2019-09-30 19:06:55 | 
| 178.57.25.225 | attack | Automatic report - Port Scan Attack  | 
                    2019-09-30 19:32:32 | 
| 106.12.85.12 | attack | Automatic report - Banned IP Access  | 
                    2019-09-30 19:17:03 | 
| 51.75.19.175 | attackspambots | Sep 30 06:37:08 web8 sshd\[28686\]: Invalid user wilma from 51.75.19.175 Sep 30 06:37:08 web8 sshd\[28686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.19.175 Sep 30 06:37:10 web8 sshd\[28686\]: Failed password for invalid user wilma from 51.75.19.175 port 54414 ssh2 Sep 30 06:41:25 web8 sshd\[30687\]: Invalid user nie from 51.75.19.175 Sep 30 06:41:25 web8 sshd\[30687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.19.175  | 
                    2019-09-30 19:40:03 | 
| 198.108.66.203 | attackbotsspam | 11211/tcp 2083/tcp [2019-09-11/30]3pkt  | 
                    2019-09-30 19:39:33 | 
| 122.6.76.126 | attack | Unauthorised access (Sep 30) SRC=122.6.76.126 LEN=40 TOS=0x10 PREC=0x40 TTL=48 ID=1451 TCP DPT=8080 WINDOW=47777 SYN Unauthorised access (Sep 30) SRC=122.6.76.126 LEN=40 TOS=0x10 PREC=0x40 TTL=48 ID=27509 TCP DPT=8080 WINDOW=44738 SYN  | 
                    2019-09-30 19:22:06 | 
| 118.69.120.27 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 30-09-2019 04:50:12.  | 
                    2019-09-30 19:30:45 | 
| 164.77.119.18 | attackspam | Sep 30 12:44:40 bouncer sshd\[19450\]: Invalid user dados from 164.77.119.18 port 44176 Sep 30 12:44:40 bouncer sshd\[19450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.119.18 Sep 30 12:44:42 bouncer sshd\[19450\]: Failed password for invalid user dados from 164.77.119.18 port 44176 ssh2 ...  | 
                    2019-09-30 19:01:25 | 
| 41.76.8.16 | attackbots | CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found  | 
                    2019-09-30 18:59:46 | 
| 159.203.201.187 | attackspambots | firewall-block, port(s): 8998/tcp  | 
                    2019-09-30 19:42:35 | 
| 177.84.146.44 | attackbotsspam | Sent Mail to target address hacked/leaked from Planet3DNow.de  | 
                    2019-09-30 19:34:50 |