City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.90.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7497
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.90.245.			IN	A
;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:13:52 CST 2022
;; MSG SIZE  rcvd: 106
        Host 245.90.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 245.90.21.104.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 187.131.86.190 | attack | Unauthorized connection attempt from IP address 187.131.86.190 on Port 445(SMB)  | 
                    2019-06-29 22:33:55 | 
| 177.125.33.57 | attackspambots | Unauthorized connection attempt from IP address 177.125.33.57 on Port 445(SMB)  | 
                    2019-06-29 22:40:13 | 
| 213.171.42.186 | attackspambots | Unauthorized connection attempt from IP address 213.171.42.186 on Port 445(SMB)  | 
                    2019-06-29 21:46:37 | 
| 92.118.37.81 | attackbots | 29.06.2019 12:50:49 Connection to port 19494 blocked by firewall  | 
                    2019-06-29 21:47:52 | 
| 41.39.47.173 | attackbotsspam | TCP port 445 (SMB) attempt blocked by firewall. [2019-06-29 10:30:56]  | 
                    2019-06-29 22:12:40 | 
| 180.76.100.178 | attackspam | Jun 29 14:57:55 tux-35-217 sshd\[17361\]: Invalid user tom from 180.76.100.178 port 39336 Jun 29 14:57:55 tux-35-217 sshd\[17361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.100.178 Jun 29 14:57:58 tux-35-217 sshd\[17361\]: Failed password for invalid user tom from 180.76.100.178 port 39336 ssh2 Jun 29 14:58:53 tux-35-217 sshd\[17363\]: Invalid user deploy from 180.76.100.178 port 47120 Jun 29 14:58:53 tux-35-217 sshd\[17363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.100.178 ...  | 
                    2019-06-29 22:39:39 | 
| 14.186.41.48 | attack | Unauthorized connection attempt from IP address 14.186.41.48 on Port 445(SMB)  | 
                    2019-06-29 21:54:16 | 
| 36.73.196.42 | attackbotsspam | Unauthorized connection attempt from IP address 36.73.196.42 on Port 445(SMB)  | 
                    2019-06-29 22:17:53 | 
| 41.45.134.141 | attackbots | Unauthorized connection attempt from IP address 41.45.134.141 on Port 445(SMB)  | 
                    2019-06-29 21:44:24 | 
| 59.127.172.234 | attack | Jun 29 13:33:56 animalibera sshd[25140]: Invalid user za from 59.127.172.234 port 38144 Jun 29 13:33:58 animalibera sshd[25140]: Failed password for invalid user za from 59.127.172.234 port 38144 ssh2 Jun 29 13:33:56 animalibera sshd[25140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.172.234 Jun 29 13:33:56 animalibera sshd[25140]: Invalid user za from 59.127.172.234 port 38144 Jun 29 13:33:58 animalibera sshd[25140]: Failed password for invalid user za from 59.127.172.234 port 38144 ssh2 ...  | 
                    2019-06-29 21:46:01 | 
| 103.48.193.61 | attackbots | WordPress login Brute force / Web App Attack on client site.  | 
                    2019-06-29 22:16:10 | 
| 60.251.195.198 | attackspambots | Invalid user postgres from 60.251.195.198 port 47636  | 
                    2019-06-29 21:43:27 | 
| 62.116.202.237 | attack | Jun 29 11:28:04 nextcloud sshd\[10979\]: Invalid user Waschlappen from 62.116.202.237 Jun 29 11:28:04 nextcloud sshd\[10979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.116.202.237 Jun 29 11:28:06 nextcloud sshd\[10979\]: Failed password for invalid user Waschlappen from 62.116.202.237 port 12647 ssh2 ...  | 
                    2019-06-29 22:01:24 | 
| 140.129.1.237 | attackbotsspam | Jun 29 16:28:33 ubuntu-2gb-nbg1-dc3-1 sshd[25364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.129.1.237 Jun 29 16:28:35 ubuntu-2gb-nbg1-dc3-1 sshd[25364]: Failed password for invalid user admin from 140.129.1.237 port 54290 ssh2 ...  | 
                    2019-06-29 22:34:22 | 
| 183.82.246.220 | attack | Unauthorized connection attempt from IP address 183.82.246.220 on Port 445(SMB)  | 
                    2019-06-29 22:22:34 |