City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.74.88
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49482
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.74.88.			IN	A
;; AUTHORITY SECTION:
.			535	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400
;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 03:30:58 CST 2022
;; MSG SIZE  rcvd: 105Host 88.74.21.104.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 88.74.21.104.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 106.12.84.63 | attack | Invalid user nk from 106.12.84.63 port 41280 | 2020-03-28 02:09:20 | 
| 202.171.77.194 | attackspambots | 202.171.77.194 - - \[27/Mar/2020:19:21:58 +0200\] "POST /wp-login.php HTTP/1.1" 200 3480 202.171.77.194 - - \[27/Mar/2020:19:21:59 +0200\] "POST /wp-login.php HTTP/1.1" 200 3480 202.171.77.194 - - \[27/Mar/2020:19:22:01 +0200\] "POST /wp-login.php HTTP/1.1" 200 3480 202.171.77.194 - - \[27/Mar/2020:19:22:02 +0200\] "POST /wp-login.php HTTP/1.1" 200 3480 202.171.77.194 - - \[27/Mar/2020:19:22:03 +0200\] "POST /wp-login.php HTTP/1.1" 200 3480 | 2020-03-28 01:44:26 | 
| 139.189.242.221 | attack | Time: Fri Mar 27 09:13:08 2020 -0300 IP: 139.189.242.221 (CN/China/-) Failures: 15 (ftpd) Interval: 3600 seconds Blocked: Permanent Block | 2020-03-28 02:17:35 | 
| 92.63.194.107 | attackspam | Fail2Ban Ban Triggered (2) | 2020-03-28 01:58:57 | 
| 222.247.0.165 | attack | GPON Home Routers Remote Code Execution Vulnerability | 2020-03-28 01:46:41 | 
| 106.12.82.245 | attack | $f2bV_matches | 2020-03-28 02:11:01 | 
| 221.2.35.78 | attackbotsspam | Invalid user armando from 221.2.35.78 port 7683 | 2020-03-28 01:52:25 | 
| 218.78.48.37 | attack | Mar 27 17:05:59 jane sshd[17541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.48.37 Mar 27 17:06:01 jane sshd[17541]: Failed password for invalid user ldv from 218.78.48.37 port 33144 ssh2 ... | 2020-03-28 01:47:03 | 
| 106.124.137.108 | attackbots | Invalid user bed from 106.124.137.108 port 34314 | 2020-03-28 01:55:40 | 
| 5.188.62.147 | attack | WordPress log in attack | 2020-03-28 02:02:11 | 
| 104.152.52.38 | attackspam | Mar 27 16:09:15 debian-2gb-nbg1-2 kernel: \[7580825.550362\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=104.152.52.38 DST=195.201.40.59 LEN=28 TOS=0x00 PREC=0x00 TTL=240 ID=27510 PROTO=UDP SPT=59945 DPT=31337 LEN=8 | 2020-03-28 02:19:57 | 
| 91.221.57.57 | attack | Unauthorized connection attempt from IP address 91.221.57.57 on Port 445(SMB) | 2020-03-28 02:20:28 | 
| 92.63.194.7 | attack | 2020-03-27T18:34:40.839535 sshd[9542]: Invalid user 1234 from 92.63.194.7 port 50160 2020-03-27T18:34:40.847934 sshd[9542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.7 2020-03-27T18:34:40.839535 sshd[9542]: Invalid user 1234 from 92.63.194.7 port 50160 2020-03-27T18:34:43.238002 sshd[9542]: Failed password for invalid user 1234 from 92.63.194.7 port 50160 ssh2 ... | 2020-03-28 01:56:49 | 
| 190.201.65.85 | attackbots | Unauthorized connection attempt from IP address 190.201.65.85 on Port 445(SMB) | 2020-03-28 02:21:51 | 
| 192.82.93.3 | attack | Unauthorized connection attempt from IP address 192.82.93.3 on Port 445(SMB) | 2020-03-28 01:41:06 |