City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.50.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38105
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.50.40.			IN	A
;; AUTHORITY SECTION:
.			419	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400
;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:34:44 CST 2022
;; MSG SIZE  rcvd: 105Host 40.50.21.104.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 40.50.21.104.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 78.133.136.142 | attack | Aug 14 07:54:14 lcl-usvr-01 sshd[22971]: Invalid user ofbiz from 78.133.136.142 Aug 14 07:54:14 lcl-usvr-01 sshd[22971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.133.136.142 Aug 14 07:54:14 lcl-usvr-01 sshd[22971]: Invalid user ofbiz from 78.133.136.142 Aug 14 07:54:16 lcl-usvr-01 sshd[22971]: Failed password for invalid user ofbiz from 78.133.136.142 port 56406 ssh2 Aug 14 08:03:41 lcl-usvr-01 sshd[25901]: Invalid user oracle from 78.133.136.142 | 2019-08-14 09:05:33 | 
| 104.206.128.22 | attackspam | " " | 2019-08-14 08:36:31 | 
| 107.170.241.152 | attack | Portscan or hack attempt detected by psad/fwsnort | 2019-08-14 08:33:22 | 
| 92.32.68.230 | attackbots | Aug 13 21:18:25 srv-4 sshd\[23074\]: Invalid user pi from 92.32.68.230 Aug 13 21:18:25 srv-4 sshd\[23073\]: Invalid user pi from 92.32.68.230 Aug 13 21:18:25 srv-4 sshd\[23074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.32.68.230 Aug 13 21:18:25 srv-4 sshd\[23073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.32.68.230 ... | 2019-08-14 08:42:22 | 
| 128.14.136.158 | attackspambots | SSH authentication failure x 6 reported by Fail2Ban ... | 2019-08-14 08:42:40 | 
| 123.206.87.154 | attack | $f2bV_matches_ltvn | 2019-08-14 08:33:01 | 
| 190.153.190.178 | attack | Brute force attempt | 2019-08-14 09:05:13 | 
| 157.230.112.34 | attack | Aug 13 18:52:09 sshgateway sshd\[17013\]: Invalid user azman from 157.230.112.34 Aug 13 18:52:09 sshgateway sshd\[17013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.112.34 Aug 13 18:52:11 sshgateway sshd\[17013\]: Failed password for invalid user azman from 157.230.112.34 port 58696 ssh2 | 2019-08-14 08:50:07 | 
| 45.179.50.112 | attackspam | Automatic report - Port Scan Attack | 2019-08-14 09:01:10 | 
| 66.249.64.155 | attackbotsspam | Automatic report - Banned IP Access | 2019-08-14 08:56:10 | 
| 185.173.35.41 | attack | Portscan or hack attempt detected by psad/fwsnort | 2019-08-14 09:06:02 | 
| 182.61.34.35 | attack | $f2bV_matches | 2019-08-14 09:00:53 | 
| 185.92.73.232 | attackbots | RDP Bruteforce | 2019-08-14 08:30:42 | 
| 86.196.58.58 | attack | Aug 13 20:42:53 dedicated sshd[10516]: Invalid user Linux from 86.196.58.58 port 51462 | 2019-08-14 08:46:23 | 
| 201.161.58.60 | attack | Aug 14 00:49:05 dedicated sshd[7027]: Invalid user download from 201.161.58.60 port 37838 | 2019-08-14 09:06:43 |