City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.51.235
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42920
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.51.235.			IN	A
;; AUTHORITY SECTION:
.			267	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:36:42 CST 2022
;; MSG SIZE  rcvd: 106
        Host 235.51.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 235.51.21.104.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 159.69.214.137 | attackspam | 2020-08-17T14:13:26.798894billing sshd[20301]: Invalid user cafe from 159.69.214.137 port 56584 2020-08-17T14:13:28.910936billing sshd[20301]: Failed password for invalid user cafe from 159.69.214.137 port 56584 ssh2 2020-08-17T14:20:18.771589billing sshd[3199]: Invalid user agustina from 159.69.214.137 port 42910 ...  | 
                    2020-08-17 17:54:55 | 
| 134.122.53.154 | attackbots | Aug 17 09:02:50 ip-172-31-16-56 sshd\[459\]: Invalid user atg from 134.122.53.154\ Aug 17 09:02:52 ip-172-31-16-56 sshd\[459\]: Failed password for invalid user atg from 134.122.53.154 port 45058 ssh2\ Aug 17 09:06:30 ip-172-31-16-56 sshd\[522\]: Invalid user user from 134.122.53.154\ Aug 17 09:06:32 ip-172-31-16-56 sshd\[522\]: Failed password for invalid user user from 134.122.53.154 port 56094 ssh2\ Aug 17 09:10:08 ip-172-31-16-56 sshd\[637\]: Invalid user lgy from 134.122.53.154\  | 
                    2020-08-17 17:30:38 | 
| 212.122.48.173 | attack | $f2bV_matches  | 
                    2020-08-17 17:32:54 | 
| 190.128.154.222 | attackspambots | srvr2: (mod_security) mod_security (id:920350) triggered by 190.128.154.222 (PY/-/-): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/17 05:56:21 [error] 296466#0: *311415 [client 190.128.154.222] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `Rx' with parameter `^[\d.:]+$' against variable `REQUEST_HEADERS:Host' [redacted] [file "/etc/modsecurity.d/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "718"] [id "920350"] [rev ""] [msg "Host header is a numeric IP address"] [redacted] [severity "4"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/210/272"] [tag "PCI/6.5.10"] [redacted] [uri "/"] [unique_id "159763658156.158408"] [ref "o0,11v22,11"], client: 190.128.154.222, [redacted] request: "HEAD / HTTP/1.1" [redacted]  | 
                    2020-08-17 17:48:16 | 
| 45.127.62.30 | attackbotsspam | email spam  | 
                    2020-08-17 17:42:09 | 
| 51.77.220.127 | attackbotsspam | 51.77.220.127 - - [17/Aug/2020:13:12:54 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2" ...  | 
                    2020-08-17 17:43:38 | 
| 179.96.62.105 | attackspambots | spam  | 
                    2020-08-17 17:29:21 | 
| 64.207.94.17 | attackspam | spam  | 
                    2020-08-17 17:36:53 | 
| 217.153.229.226 | attackspambots | Aug 17 11:36:16 root sshd[4541]: Invalid user ekp from 217.153.229.226 ...  | 
                    2020-08-17 17:51:25 | 
| 222.186.30.35 | attack | Unauthorized connection attempt detected from IP address 222.186.30.35 to port 22 [T]  | 
                    2020-08-17 17:28:59 | 
| 180.76.101.202 | attack | Aug 17 01:32:10 s158375 sshd[23658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.101.202  | 
                    2020-08-17 17:18:41 | 
| 222.186.180.17 | attack | Aug 17 08:11:26 ns3164893 sshd[21902]: Failed password for root from 222.186.180.17 port 7278 ssh2 Aug 17 08:11:29 ns3164893 sshd[21902]: Failed password for root from 222.186.180.17 port 7278 ssh2 ...  | 
                    2020-08-17 17:40:15 | 
| 45.95.168.223 | attackspambots | Telnet Honeypot -> Telnet Bruteforce / Login  | 
                    2020-08-17 17:49:37 | 
| 80.92.181.3 | attackbotsspam | spam  | 
                    2020-08-17 17:19:10 | 
| 164.132.56.243 | attackspam | DATE:2020-08-17 08:49:37,IP:164.132.56.243,MATCHES:10,PORT:ssh  | 
                    2020-08-17 17:52:45 |