City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.55.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29742
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.55.219.			IN	A
;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 03:30:29 CST 2022
;; MSG SIZE  rcvd: 106Host 219.55.21.104.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 219.55.21.104.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 37.187.54.45 | attackbotsspam | Aug 9 08:50:48 SilenceServices sshd[21257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.54.45 Aug 9 08:50:50 SilenceServices sshd[21257]: Failed password for invalid user hadoop from 37.187.54.45 port 41158 ssh2 Aug 9 08:54:58 SilenceServices sshd[24615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.54.45 | 2019-08-09 15:07:25 | 
| 200.71.55.143 | attackspam | Aug 9 07:04:14 MK-Soft-VM3 sshd\[28237\]: Invalid user debian from 200.71.55.143 port 37168 Aug 9 07:04:14 MK-Soft-VM3 sshd\[28237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.71.55.143 Aug 9 07:04:16 MK-Soft-VM3 sshd\[28237\]: Failed password for invalid user debian from 200.71.55.143 port 37168 ssh2 ... | 2019-08-09 15:45:27 | 
| 122.195.200.14 | attackspam | fire | 2019-08-09 15:02:37 | 
| 79.103.201.124 | attackspambots | 23/tcp [2019-08-09]1pkt | 2019-08-09 15:11:50 | 
| 197.54.110.182 | attackspambots | 445/tcp [2019-08-09]1pkt | 2019-08-09 15:45:56 | 
| 35.190.139.112 | attackbotsspam | 8088/tcp [2019-08-09]1pkt | 2019-08-09 15:37:25 | 
| 157.230.94.157 | attackbots | Aug 9 07:47:41 mail sshd\[18855\]: Failed password for invalid user dom from 157.230.94.157 port 61255 ssh2 Aug 9 08:04:42 mail sshd\[19003\]: Invalid user certificat from 157.230.94.157 port 42305 ... | 2019-08-09 15:21:59 | 
| 14.163.5.51 | attack | 445/tcp [2019-08-09]1pkt | 2019-08-09 15:18:14 | 
| 218.92.0.188 | attack | Aug 9 09:04:07 icinga sshd[22167]: Failed password for root from 218.92.0.188 port 7128 ssh2 Aug 9 09:04:25 icinga sshd[22167]: error: maximum authentication attempts exceeded for root from 218.92.0.188 port 7128 ssh2 [preauth] ... | 2019-08-09 15:37:06 | 
| 180.76.15.28 | attackspam | Automatic report - Banned IP Access | 2019-08-09 15:33:43 | 
| 42.113.104.70 | attack | 445/tcp [2019-08-09]1pkt | 2019-08-09 15:30:28 | 
| 113.185.78.221 | attack | 445/tcp [2019-08-09]1pkt | 2019-08-09 15:31:58 | 
| 89.46.107.174 | attackspam | xmlrpc attack | 2019-08-09 15:17:48 | 
| 129.204.67.235 | attackspam | Aug 9 09:25:51 dedicated sshd[429]: Invalid user bill from 129.204.67.235 port 40128 | 2019-08-09 15:27:19 | 
| 115.238.245.2 | attackbotsspam | fire | 2019-08-09 15:06:51 |