City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.90.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34204
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.21.90.29.			IN	A
;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400
;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:13:55 CST 2022
;; MSG SIZE  rcvd: 105
        Host 29.90.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 29.90.21.104.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 190.63.184.182 | attack | SSH login attempts with user root.  | 
                    2020-03-19 00:11:00 | 
| 2.139.209.78 | attackbots | B: Abusive ssh attack  | 
                    2020-03-19 00:03:28 | 
| 116.206.8.63 | attack | Honeypot attack, port: 445, PTR: subs24-116-206-8-63.three.co.id.  | 
                    2020-03-18 23:58:17 | 
| 115.77.245.179 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:26.  | 
                    2020-03-18 23:42:52 | 
| 51.255.149.135 | attackspambots | Mar 18 17:56:44 www sshd\[20957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.149.135 user=root Mar 18 17:56:45 www sshd\[20957\]: Failed password for root from 51.255.149.135 port 51525 ssh2 Mar 18 17:59:10 www sshd\[20983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.149.135 user=root ...  | 
                    2020-03-19 00:13:10 | 
| 51.91.250.49 | attackspambots | Mar 18 14:04:17 game-panel sshd[23914]: Failed password for root from 51.91.250.49 port 48158 ssh2 Mar 18 14:08:35 game-panel sshd[24074]: Failed password for root from 51.91.250.49 port 41170 ssh2  | 
                    2020-03-18 23:23:47 | 
| 103.7.130.226 | attackspam | Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:23.  | 
                    2020-03-18 23:53:23 | 
| 34.89.231.16 | attack | Mar 18 14:02:18 srv-ubuntu-dev3 sshd[17153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.89.231.16 user=root Mar 18 14:02:20 srv-ubuntu-dev3 sshd[17153]: Failed password for root from 34.89.231.16 port 37370 ssh2 Mar 18 14:06:17 srv-ubuntu-dev3 sshd[17760]: Invalid user noc from 34.89.231.16 Mar 18 14:06:17 srv-ubuntu-dev3 sshd[17760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.89.231.16 Mar 18 14:06:17 srv-ubuntu-dev3 sshd[17760]: Invalid user noc from 34.89.231.16 Mar 18 14:06:19 srv-ubuntu-dev3 sshd[17760]: Failed password for invalid user noc from 34.89.231.16 port 56690 ssh2 Mar 18 14:10:26 srv-ubuntu-dev3 sshd[19175]: Invalid user pi from 34.89.231.16 Mar 18 14:10:26 srv-ubuntu-dev3 sshd[19175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.89.231.16 Mar 18 14:10:26 srv-ubuntu-dev3 sshd[19175]: Invalid user pi from 34.89.231.16 Mar 18 14:10: ...  | 
                    2020-03-18 23:39:58 | 
| 178.128.221.237 | attack | Mar 18 16:49:33 host01 sshd[15872]: Failed password for root from 178.128.221.237 port 46892 ssh2 Mar 18 16:53:26 host01 sshd[16420]: Failed password for root from 178.128.221.237 port 52238 ssh2 ...  | 
                    2020-03-18 23:57:24 | 
| 61.177.172.128 | attackspambots | Mar 18 10:55:41 ny01 sshd[7976]: Failed password for root from 61.177.172.128 port 37787 ssh2 Mar 18 10:55:44 ny01 sshd[7976]: Failed password for root from 61.177.172.128 port 37787 ssh2 Mar 18 10:55:48 ny01 sshd[7976]: Failed password for root from 61.177.172.128 port 37787 ssh2 Mar 18 10:55:56 ny01 sshd[7976]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 37787 ssh2 [preauth]  | 
                    2020-03-18 23:19:46 | 
| 106.12.5.96 | attack | Dec 20 09:24:34 woltan sshd[2100]: Failed password for root from 106.12.5.96 port 51932 ssh2  | 
                    2020-03-18 23:58:41 | 
| 192.241.238.164 | attack | firewall-block, port(s): 5632/udp  | 
                    2020-03-19 00:11:49 | 
| 41.39.36.100 | attack | Automatic report - Port Scan  | 
                    2020-03-19 00:08:59 | 
| 142.93.239.197 | attack | This client attempted to login to an administrator account on a Website, or abused from another resource.  | 
                    2020-03-19 00:22:32 | 
| 176.113.70.60 | attackspam | SIP/5060 Probe, BF, Hack -  | 
                    2020-03-19 00:17:03 |