City: unknown
Region: unknown
Country: Australia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.20.200.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62556
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.20.200.161.			IN	A
;; AUTHORITY SECTION:
.			522	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:09:48 CST 2022
;; MSG SIZE  rcvd: 107
        161.200.20.103.in-addr.arpa domain name pointer server-4h-r65.ipv4.syd02.ds.network.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
161.200.20.103.in-addr.arpa	name = server-4h-r65.ipv4.syd02.ds.network.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 64.111.126.43 | attack | 64.111.126.43 - - [13/May/2020:14:31:05 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 64.111.126.43 - - [13/May/2020:14:31:06 +0200] "POST /wp-login.php HTTP/1.1" 200 5953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 64.111.126.43 - - [13/May/2020:14:31:07 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"  | 
                    2020-05-14 05:02:39 | 
| 94.130.26.5 | attackbotsspam | ...  | 
                    2020-05-14 05:19:50 | 
| 190.74.127.118 | attackbots | Unauthorized connection attempt from IP address 190.74.127.118 on Port 445(SMB)  | 
                    2020-05-14 05:00:07 | 
| 123.21.140.212 | attackspam | May 13 13:30:58 sigma sshd\[25135\]: Invalid user admin from 123.21.140.212May 13 13:30:59 sigma sshd\[25135\]: Failed password for invalid user admin from 123.21.140.212 port 36482 ssh2 ...  | 
                    2020-05-14 05:08:43 | 
| 80.211.249.187 | attackspambots | May 13 17:05:04 lanister sshd[25339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.249.187 May 13 17:05:04 lanister sshd[25339]: Invalid user search from 80.211.249.187 May 13 17:05:07 lanister sshd[25339]: Failed password for invalid user search from 80.211.249.187 port 47198 ssh2 May 13 17:09:11 lanister sshd[25458]: Invalid user mmy from 80.211.249.187  | 
                    2020-05-14 05:26:03 | 
| 187.50.124.218 | attackbots | Unauthorized connection attempt from IP address 187.50.124.218 on Port 445(SMB)  | 
                    2020-05-14 05:07:42 | 
| 132.232.66.227 | attackspambots | odoo8 ...  | 
                    2020-05-14 05:23:44 | 
| 86.120.255.85 | attack | Automatic report - SSH Brute-Force Attack  | 
                    2020-05-14 05:27:51 | 
| 198.108.66.32 | attack | Unauthorized connection attempt detected from IP address 198.108.66.32 to port 102 [T]  | 
                    2020-05-14 05:09:52 | 
| 49.235.92.208 | attack | 20 attempts against mh-ssh on install-test  | 
                    2020-05-14 04:56:45 | 
| 106.12.14.183 | attack | May 13 22:53:53 Ubuntu-1404-trusty-64-minimal sshd\[20064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.14.183 user=root May 13 22:53:55 Ubuntu-1404-trusty-64-minimal sshd\[20064\]: Failed password for root from 106.12.14.183 port 43254 ssh2 May 13 23:01:08 Ubuntu-1404-trusty-64-minimal sshd\[29743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.14.183 user=root May 13 23:01:10 Ubuntu-1404-trusty-64-minimal sshd\[29743\]: Failed password for root from 106.12.14.183 port 49636 ssh2 May 13 23:09:09 Ubuntu-1404-trusty-64-minimal sshd\[1943\]: Invalid user jira from 106.12.14.183 May 13 23:09:09 Ubuntu-1404-trusty-64-minimal sshd\[1943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.14.183  | 
                    2020-05-14 05:24:56 | 
| 159.65.128.55 | attackspambots | xmlrpc attack  | 
                    2020-05-14 05:04:01 | 
| 118.25.68.254 | attackbots | May 14 07:09:19 NG-HHDC-SVS-001 sshd[19994]: Invalid user prueba2 from 118.25.68.254 ...  | 
                    2020-05-14 05:14:28 | 
| 49.233.140.233 | attackbotsspam | 2020-05-13T21:05:21.059241shield sshd\[5601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.140.233 user=ftp 2020-05-13T21:05:22.954507shield sshd\[5601\]: Failed password for ftp from 49.233.140.233 port 56714 ssh2 2020-05-13T21:09:10.751565shield sshd\[7408\]: Invalid user jc2 from 49.233.140.233 port 43642 2020-05-13T21:09:10.759955shield sshd\[7408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.140.233 2020-05-13T21:09:12.768923shield sshd\[7408\]: Failed password for invalid user jc2 from 49.233.140.233 port 43642 ssh2  | 
                    2020-05-14 05:24:27 | 
| 52.141.38.71 | attack | bruteforce detected  | 
                    2020-05-14 05:28:54 |