City: unknown
Region: unknown
Country: Australia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.20.200.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9027
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.20.200.241.			IN	A
;; AUTHORITY SECTION:
.			294	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:09:49 CST 2022
;; MSG SIZE  rcvd: 107
        241.200.20.103.in-addr.arpa domain name pointer server-6p-r65.ipv4.syd02.ds.network.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
241.200.20.103.in-addr.arpa	name = server-6p-r65.ipv4.syd02.ds.network.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 138.68.242.220 | attackspambots | SSH bruteforce  | 
                    2020-01-09 05:43:40 | 
| 220.120.242.152 | attackspambots | Port Scan  | 
                    2020-01-09 05:44:12 | 
| 77.30.198.213 | attack | Port Scan  | 
                    2020-01-09 05:55:24 | 
| 69.229.6.10 | attackspambots | frenzy  | 
                    2020-01-09 05:57:26 | 
| 222.186.169.194 | attack | Jan 8 22:37:43 dedicated sshd[32702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root Jan 8 22:37:45 dedicated sshd[32702]: Failed password for root from 222.186.169.194 port 57730 ssh2  | 
                    2020-01-09 05:40:04 | 
| 58.213.48.218 | attackbots | Unauthorized connection attempt detected from IP address 58.213.48.218 to port 1433 [T]  | 
                    2020-01-09 05:30:05 | 
| 92.222.72.234 | attackspam | Jan 8 18:08:02 firewall sshd[27588]: Invalid user admin from 92.222.72.234 Jan 8 18:08:03 firewall sshd[27588]: Failed password for invalid user admin from 92.222.72.234 port 44101 ssh2 Jan 8 18:11:20 firewall sshd[27646]: Invalid user system from 92.222.72.234 ...  | 
                    2020-01-09 05:56:00 | 
| 80.82.78.100 | attack | 80.82.78.100 was recorded 12 times by 6 hosts attempting to connect to the following ports: 1045,1034,1051. Incident counter (4h, 24h, all-time): 12, 62, 15071  | 
                    2020-01-09 05:36:50 | 
| 5.39.217.81 | attackspam | Unauthorized connection attempt detected from IP address 5.39.217.81 to port 5295 [T]  | 
                    2020-01-09 05:32:18 | 
| 118.25.54.60 | attack | Jan 8 22:11:46 icinga sshd[3110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.54.60 Jan 8 22:11:49 icinga sshd[3110]: Failed password for invalid user cz from 118.25.54.60 port 33536 ssh2 ...  | 
                    2020-01-09 05:33:52 | 
| 176.74.97.89 | attack | Unauthorized connection attempt detected from IP address 176.74.97.89 to port 8728 [T]  | 
                    2020-01-09 05:21:55 | 
| 175.140.119.26 | attackspambots | Jan 8 sshd[20766]: Invalid user test from 175.140.119.26 port 51912  | 
                    2020-01-09 06:02:41 | 
| 35.195.238.142 | attackbotsspam | Jan 8 11:37:10 hanapaa sshd\[22353\]: Invalid user jira from 35.195.238.142 Jan 8 11:37:10 hanapaa sshd\[22353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.238.195.35.bc.googleusercontent.com Jan 8 11:37:12 hanapaa sshd\[22353\]: Failed password for invalid user jira from 35.195.238.142 port 56388 ssh2 Jan 8 11:40:08 hanapaa sshd\[22799\]: Invalid user db2adm from 35.195.238.142 Jan 8 11:40:08 hanapaa sshd\[22799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.238.195.35.bc.googleusercontent.com  | 
                    2020-01-09 05:40:53 | 
| 101.71.2.137 | attackbots | Jan 8 22:36:52 legacy sshd[14490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.2.137 Jan 8 22:36:54 legacy sshd[14490]: Failed password for invalid user bot from 101.71.2.137 port 36256 ssh2 Jan 8 22:39:45 legacy sshd[14690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.2.137 ...  | 
                    2020-01-09 05:54:16 | 
| 114.253.103.137 | attackbots | Unauthorized connection attempt detected from IP address 114.253.103.137 to port 23 [T]  | 
                    2020-01-09 05:26:10 |