City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.72.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6851
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.72.144.			IN	A
;; AUTHORITY SECTION:
.			48	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 03:30:55 CST 2022
;; MSG SIZE  rcvd: 106Host 144.72.21.104.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 144.72.21.104.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 185.175.93.101 | attack | ET DROP Dshield Block Listed Source group 1 - port: 5910 proto: TCP cat: Misc Attack | 2020-03-12 18:35:40 | 
| 122.51.41.26 | attackspambots | detected by Fail2Ban | 2020-03-12 18:14:30 | 
| 128.199.143.89 | attack | Automatic report: SSH brute force attempt | 2020-03-12 18:16:08 | 
| 14.136.204.41 | attackbotsspam | SSH bruteforce | 2020-03-12 18:35:19 | 
| 185.85.238.244 | attackbots | WordPress login Brute force / Web App Attack on client site. | 2020-03-12 18:32:20 | 
| 92.240.207.196 | attackbots | Chat Spam | 2020-03-12 18:29:28 | 
| 89.248.168.226 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - | 2020-03-12 18:39:10 | 
| 117.121.38.58 | attackspam | Mar 12 09:21:30 jane sshd[12349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.38.58 Mar 12 09:21:32 jane sshd[12349]: Failed password for invalid user csgo from 117.121.38.58 port 51076 ssh2 ... | 2020-03-12 18:28:55 | 
| 176.119.141.79 | attack | B: Magento admin pass test (wrong country) | 2020-03-12 18:19:23 | 
| 36.26.64.143 | attackspambots | pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.26.64.143 user=root Failed password for root from 36.26.64.143 port 60837 ssh2 Invalid user postgres from 36.26.64.143 port 53617 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.26.64.143 Failed password for invalid user postgres from 36.26.64.143 port 53617 ssh2 | 2020-03-12 18:10:51 | 
| 92.247.142.182 | attackspambots | Absender hat Spam-Falle ausgel?st | 2020-03-12 18:18:51 | 
| 103.108.220.73 | attackspambots | Brute force attempt | 2020-03-12 18:13:27 | 
| 104.27.137.81 | spam | MARRE de ces ORDURES et autres FILS de PUTE genre SOUS MERDES capables de POLLUER STUPIDEMENT pour ne pas dire CONNEMENT la Planète par des POURRIELS INUTILES sur des listes VOLÉES on ne sait où et SANS notre accord ! X-Originating-IP: [213.171.216.60] Received: from 10.200.77.176 (EHLO smtp.livemail.co.uk) (213.171.216.60) by mta1047.mail.ir2.yahoo.com with SMTPS; Received: from mvtp (unknown [188.162.198.188]) (Authenticated sender: web@keepfitwithkelly.co.uk) by smtp.livemail.co.uk (Postfix) with ESMTPSA id EB0D52805CD; Message-ID: <0d619dcec5ee3b3711a41241b573595531f1e6ff@keepfitwithkelly.co.uk> Reply-To: Jennifer | 2020-03-12 18:19:00 | 
| 94.181.94.12 | attackspambots | Mar 12 11:12:24 hosting sshd[23302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.181.94.12 user=root Mar 12 11:12:26 hosting sshd[23302]: Failed password for root from 94.181.94.12 port 42886 ssh2 ... | 2020-03-12 18:29:44 | 
| 14.168.31.168 | attack | 20/3/11@23:48:21: FAIL: Alarm-Network address from=14.168.31.168 ... | 2020-03-12 18:17:35 |