City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.17.112.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24086
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.17.112.12.			IN	A
;; AUTHORITY SECTION:
.			235	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:38:48 CST 2022
;; MSG SIZE  rcvd: 106Host 12.112.17.104.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 12.112.17.104.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 2.44.247.149 | attackspambots | May 23 21:14:07 ms-srv sshd[46884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.44.247.149 May 23 21:14:07 ms-srv sshd[46883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.44.247.149 | 2020-05-24 06:12:50 | 
| 159.89.54.255 | attackbotsspam | scan z | 2020-05-24 06:15:27 | 
| 185.189.14.91 | attack | May 23 13:14:51 mockhub sshd[30209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.189.14.91 May 23 13:14:52 mockhub sshd[30209]: Failed password for invalid user kfs from 185.189.14.91 port 46738 ssh2 ... | 2020-05-24 05:37:30 | 
| 105.234.157.21 | attackbots | [Sun May 24 04:05:58 2020] - Syn Flood From IP: 105.234.157.21 Port: 62246 | 2020-05-24 05:37:55 | 
| 96.44.162.82 | attackspambots | SASL broute force | 2020-05-24 06:07:33 | 
| 222.186.42.7 | attack | May 24 00:06:45 minden010 sshd[18591]: Failed password for root from 222.186.42.7 port 43829 ssh2 May 24 00:06:48 minden010 sshd[18591]: Failed password for root from 222.186.42.7 port 43829 ssh2 May 24 00:06:50 minden010 sshd[18591]: Failed password for root from 222.186.42.7 port 43829 ssh2 ... | 2020-05-24 06:08:12 | 
| 49.248.121.10 | attack | DATE:2020-05-24 00:07:43, IP:49.248.121.10, PORT:ssh SSH brute force auth (docker-dc) | 2020-05-24 06:09:21 | 
| 209.59.143.230 | attackspambots | Invalid user fsc from 209.59.143.230 port 59580 | 2020-05-24 06:16:15 | 
| 42.82.224.70 | attackspambots | trying to access non-authorized port | 2020-05-24 05:50:20 | 
| 51.136.112.67 | attackspambots | Failed password for invalid user xiafan from 51.136.112.67 port 54074 ssh2 | 2020-05-24 06:01:40 | 
| 182.61.12.12 | attackspam | SSH Brute-Force reported by Fail2Ban | 2020-05-24 05:41:02 | 
| 183.89.212.114 | attack | (imapd) Failed IMAP login from 183.89.212.114 (TH/Thailand/mx-ll-183.89.212-114.dynamic.3bb.in.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 24 00:43:58 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 5 secs): user= | 2020-05-24 06:15:11 | 
| 88.149.248.9 | attackspam | SSH Invalid Login | 2020-05-24 05:51:11 | 
| 84.255.249.179 | attackspam | Invalid user woq from 84.255.249.179 port 42690 | 2020-05-24 06:11:24 | 
| 120.53.22.204 | attack | SSH Invalid Login | 2020-05-24 06:00:00 |