City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.17.196.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52724
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.17.196.92.			IN	A
;; AUTHORITY SECTION:
.			374	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400
;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:40:21 CST 2022
;; MSG SIZE  rcvd: 106
        Host 92.196.17.104.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 92.196.17.104.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 51.77.147.95 | attack | Invalid user test from 51.77.147.95 port 46466  | 
                    2019-10-25 02:22:23 | 
| 119.10.114.5 | attack | $f2bV_matches  | 
                    2019-10-25 02:03:03 | 
| 150.223.18.7 | attackspambots | Invalid user snovelor from 150.223.18.7 port 58593  | 
                    2019-10-25 01:56:39 | 
| 223.197.175.171 | attack | Invalid user zimbra from 223.197.175.171 port 55926  | 
                    2019-10-25 02:29:22 | 
| 80.211.172.45 | attackbots | Invalid user rabbitmq from 80.211.172.45 port 44744  | 
                    2019-10-25 02:13:22 | 
| 91.69.234.72 | attackspam | Invalid user pi from 91.69.234.72 port 50474  | 
                    2019-10-25 02:09:21 | 
| 60.250.164.169 | attackspam | $f2bV_matches  | 
                    2019-10-25 02:18:57 | 
| 36.155.115.137 | attackspam | Invalid user temp from 36.155.115.137 port 33123  | 
                    2019-10-25 02:26:29 | 
| 212.237.22.95 | attack | Invalid user murai from 212.237.22.95 port 33836  | 
                    2019-10-25 02:31:36 | 
| 156.236.71.59 | attackspam | Invalid user energo from 156.236.71.59 port 33155  | 
                    2019-10-25 01:55:38 | 
| 49.235.175.217 | attack | $f2bV_matches_ltvn  | 
                    2019-10-25 02:23:55 | 
| 89.133.86.221 | attack | 2019-10-23 11:39:59 server sshd[82106]: Failed password for invalid user hmugo from 89.133.86.221 port 39530 ssh2  | 
                    2019-10-25 02:09:43 | 
| 159.65.88.161 | attackbotsspam | SSH bruteforce (Triggered fail2ban)  | 
                    2019-10-25 01:55:20 | 
| 42.200.66.164 | attack | Oct 24 08:05:21 friendsofhawaii sshd\[23922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-66-164.static.imsbiz.com user=root Oct 24 08:05:23 friendsofhawaii sshd\[23922\]: Failed password for root from 42.200.66.164 port 39906 ssh2 Oct 24 08:12:09 friendsofhawaii sshd\[24576\]: Invalid user admin!\$ from 42.200.66.164 Oct 24 08:12:09 friendsofhawaii sshd\[24576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-66-164.static.imsbiz.com Oct 24 08:12:11 friendsofhawaii sshd\[24576\]: Failed password for invalid user admin!\$ from 42.200.66.164 port 50768 ssh2  | 
                    2019-10-25 02:24:28 | 
| 165.227.97.108 | attackbots | Tried sshing with brute force.  | 
                    2019-10-25 01:53:45 |