City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.55.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51468
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.55.153.			IN	A
;; AUTHORITY SECTION:
.			486	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400
;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 03:30:29 CST 2022
;; MSG SIZE  rcvd: 106Host 153.55.21.104.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 153.55.21.104.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 222.210.52.122 | attackspam | Unauthorized connection attempt detected from IP address 222.210.52.122 to port 23 [T] | 2020-05-09 03:17:10 | 
| 142.93.211.52 | attackbotsspam | (sshd) Failed SSH login from 142.93.211.52 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 8 19:27:53 amsweb01 sshd[15559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.211.52 user=root May 8 19:27:56 amsweb01 sshd[15559]: Failed password for root from 142.93.211.52 port 58452 ssh2 May 8 19:34:04 amsweb01 sshd[16191]: Invalid user test from 142.93.211.52 port 54878 May 8 19:34:06 amsweb01 sshd[16191]: Failed password for invalid user test from 142.93.211.52 port 54878 ssh2 May 8 19:38:45 amsweb01 sshd[16590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.211.52 user=root | 2020-05-09 03:26:00 | 
| 47.102.102.47 | attackbots | Unauthorized connection attempt detected from IP address 47.102.102.47 to port 6380 [T] | 2020-05-09 03:44:06 | 
| 182.115.140.40 | attackspam | Unauthorized connection attempt detected from IP address 182.115.140.40 to port 23 [T] | 2020-05-09 03:19:48 | 
| 66.240.236.119 | attack | 05/08/2020-15:20:01.491531 66.240.236.119 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 68 | 2020-05-09 03:40:13 | 
| 115.224.89.232 | attack | Honeypot attack, port: 5555, PTR: PTR record not found | 2020-05-09 03:32:30 | 
| 27.205.208.233 | attackbotsspam | Unauthorized connection attempt detected from IP address 27.205.208.233 to port 23 [T] | 2020-05-09 03:48:37 | 
| 115.44.253.219 | attackspam | Unauthorized connection attempt detected from IP address 115.44.253.219 to port 5555 [T] | 2020-05-09 03:33:29 | 
| 5.172.14.244 | attack | 22/tcp [2020-05-08]1pkt | 2020-05-09 03:50:06 | 
| 60.170.166.189 | attackspambots | Unauthorized connection attempt detected from IP address 60.170.166.189 to port 23 [T] | 2020-05-09 03:40:50 | 
| 117.70.61.151 | attackbots | Unauthorized connection attempt detected from IP address 117.70.61.151 to port 23 [T] | 2020-05-09 03:31:14 | 
| 60.25.162.173 | attack | Unauthorized connection attempt detected from IP address 60.25.162.173 to port 8080 [T] | 2020-05-09 03:41:19 | 
| 103.68.156.186 | attackspambots | Unauthorized connection attempt detected from IP address 103.68.156.186 to port 23 [T] | 2020-05-09 03:37:48 | 
| 223.204.191.55 | attackspam | Unauthorized connection attempt detected from IP address 223.204.191.55 to port 23 [T] | 2020-05-09 03:16:04 | 
| 36.113.164.27 | attackspam | Unauthorized connection attempt detected from IP address 36.113.164.27 to port 445 [T] | 2020-05-09 03:46:54 |