City: unknown
Region: unknown
Country: New Zealand
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.8.142.187
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8683
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.8.142.187.			IN	A
;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400
;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 15:56:07 CST 2022
;; MSG SIZE  rcvd: 106187.142.8.103.in-addr.arpa domain name pointer 103-8-142-187.nownz.co.nz.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
187.142.8.103.in-addr.arpa	name = 103-8-142-187.nownz.co.nz.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 94.179.129.85 | attack | Jan 30 05:58:47 vmd17057 sshd\[7065\]: Invalid user amavis from 94.179.129.85 port 39062 Jan 30 05:58:47 vmd17057 sshd\[7065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.179.129.85 Jan 30 05:58:49 vmd17057 sshd\[7065\]: Failed password for invalid user amavis from 94.179.129.85 port 39062 ssh2 ... | 2020-01-30 19:25:29 | 
| 183.89.245.223 | attackbots | Unauthorized connection attempt detected from IP address 183.89.245.223 to port 445 [T] | 2020-01-30 19:17:49 | 
| 58.218.56.85 | attackspambots | Unauthorized connection attempt detected from IP address 58.218.56.85 to port 22 [T] | 2020-01-30 19:11:54 | 
| 118.70.109.151 | attack | Unauthorized connection attempt detected from IP address 118.70.109.151 to port 445 [T] | 2020-01-30 19:20:46 | 
| 114.230.65.2 | attack | Unauthorized connection attempt detected from IP address 114.230.65.2 to port 6656 [T] | 2020-01-30 19:04:28 | 
| 218.92.0.172 | attack | Jan 30 12:04:27 markkoudstaal sshd[5216]: Failed password for root from 218.92.0.172 port 31188 ssh2 Jan 30 12:04:31 markkoudstaal sshd[5216]: Failed password for root from 218.92.0.172 port 31188 ssh2 Jan 30 12:04:35 markkoudstaal sshd[5216]: Failed password for root from 218.92.0.172 port 31188 ssh2 Jan 30 12:04:39 markkoudstaal sshd[5216]: Failed password for root from 218.92.0.172 port 31188 ssh2 | 2020-01-30 19:30:26 | 
| 118.172.114.6 | attack | Unauthorized connection attempt detected from IP address 118.172.114.6 to port 82 [J] | 2020-01-30 19:00:30 | 
| 1.33.96.205 | attack | Unauthorized connection attempt detected from IP address 1.33.96.205 to port 1433 [T] | 2020-01-30 19:15:20 | 
| 101.51.85.36 | attack | Unauthorized connection attempt detected from IP address 101.51.85.36 to port 445 [T] | 2020-01-30 19:08:29 | 
| 42.117.25.234 | attackspambots | Unauthorized connection attempt detected from IP address 42.117.25.234 to port 8081 [T] | 2020-01-30 19:12:49 | 
| 139.59.123.163 | attack | " " | 2020-01-30 19:35:18 | 
| 113.22.18.4 | attackbots | Unauthorized connection attempt detected from IP address 113.22.18.4 to port 445 [T] | 2020-01-30 19:06:49 | 
| 43.230.207.225 | attack | Unauthorized connection attempt detected from IP address 43.230.207.225 to port 2220 [J] | 2020-01-30 19:26:12 | 
| 112.72.67.7 | attack | Unauthorized connection attempt detected from IP address 112.72.67.7 to port 23 [T] | 2020-01-30 19:07:14 | 
| 49.235.133.208 | attack | Unauthorized connection attempt detected from IP address 49.235.133.208 to port 2220 [J] | 2020-01-30 19:24:35 |