City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.141.253.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9647
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.141.253.127.		IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400
;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:23:55 CST 2025
;; MSG SIZE  rcvd: 108
        Host 127.253.141.104.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 127.253.141.104.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 84.2.62.48 | attackspambots | SSH login attempts.  | 
                    2020-08-18 22:07:54 | 
| 101.231.135.146 | attackspam | Aug 18 15:35:41 *hidden* sshd[59827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.135.146 Aug 18 15:35:42 *hidden* sshd[59827]: Failed password for invalid user dock from 101.231.135.146 port 44218 ssh2 Aug 18 15:38:21 *hidden* sshd[60228]: Invalid user hydro from 101.231.135.146 port 45622  | 
                    2020-08-18 22:29:33 | 
| 216.244.66.234 | attackbots | 20 attempts against mh-misbehave-ban on pluto  | 
                    2020-08-18 22:17:37 | 
| 13.68.193.165 | attack | 2020-08-18T15:29:30.277414mail.standpoint.com.ua sshd[31241]: Invalid user elasticsearch from 13.68.193.165 port 60980 2020-08-18T15:29:30.279981mail.standpoint.com.ua sshd[31241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.68.193.165 2020-08-18T15:29:30.277414mail.standpoint.com.ua sshd[31241]: Invalid user elasticsearch from 13.68.193.165 port 60980 2020-08-18T15:29:31.682451mail.standpoint.com.ua sshd[31241]: Failed password for invalid user elasticsearch from 13.68.193.165 port 60980 ssh2 2020-08-18T15:34:32.973724mail.standpoint.com.ua sshd[31894]: Invalid user yaoyuan from 13.68.193.165 port 42822 ...  | 
                    2020-08-18 22:50:17 | 
| 84.201.160.12 | attackbotsspam | SSH login attempts.  | 
                    2020-08-18 22:21:19 | 
| 84.205.251.18 | attack | SSH login attempts.  | 
                    2020-08-18 22:45:52 | 
| 84.201.141.111 | attackbotsspam | SSH login attempts.  | 
                    2020-08-18 22:13:50 | 
| 45.86.168.201 | attack | Sql/code injection probe  | 
                    2020-08-18 22:21:43 | 
| 84.201.174.178 | attackbotsspam | SSH login attempts.  | 
                    2020-08-18 22:34:25 | 
| 192.241.211.94 | attack | Aug 18 15:54:16 srv-ubuntu-dev3 sshd[113642]: Invalid user daniel from 192.241.211.94 Aug 18 15:54:16 srv-ubuntu-dev3 sshd[113642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.211.94 Aug 18 15:54:16 srv-ubuntu-dev3 sshd[113642]: Invalid user daniel from 192.241.211.94 Aug 18 15:54:17 srv-ubuntu-dev3 sshd[113642]: Failed password for invalid user daniel from 192.241.211.94 port 55194 ssh2 Aug 18 15:58:24 srv-ubuntu-dev3 sshd[114131]: Invalid user webmaster from 192.241.211.94 Aug 18 15:58:24 srv-ubuntu-dev3 sshd[114131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.211.94 Aug 18 15:58:24 srv-ubuntu-dev3 sshd[114131]: Invalid user webmaster from 192.241.211.94 Aug 18 15:58:26 srv-ubuntu-dev3 sshd[114131]: Failed password for invalid user webmaster from 192.241.211.94 port 36810 ssh2 Aug 18 16:02:27 srv-ubuntu-dev3 sshd[114776]: Invalid user zh from 192.241.211.94 ...  | 
                    2020-08-18 22:07:40 | 
| 174.219.143.140 | attackspambots | Brute forcing email accounts  | 
                    2020-08-18 22:26:20 | 
| 45.79.96.242 | attackspambots | scans 2 times in preceeding hours on the ports (in chronological order) 6000 6000 resulting in total of 3 scans from 45.79.0.0/16 block.  | 
                    2020-08-18 22:33:32 | 
| 34.73.40.158 | attackspambots | Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root  | 
                    2020-08-18 22:09:21 | 
| 106.13.44.60 | attackspambots | [N10.H2.VM2] Port Scanner Detected Blocked by UFW  | 
                    2020-08-18 22:44:32 | 
| 128.199.84.251 | attackbotsspam | Aug 18 16:07:08 havingfunrightnow sshd[5053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.84.251 Aug 18 16:07:09 havingfunrightnow sshd[5053]: Failed password for invalid user gjw from 128.199.84.251 port 55320 ssh2 Aug 18 16:10:59 havingfunrightnow sshd[5181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.84.251 ...  | 
                    2020-08-18 22:48:14 |