City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.218.209.35
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30646
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.218.209.35.			IN	A
;; AUTHORITY SECTION:
.			521	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:58:58 CST 2022
;; MSG SIZE  rcvd: 10735.209.218.104.in-addr.arpa has no PTR recordServer:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
*** Can't find 35.209.218.104.in-addr.arpa.: No answer
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 117.247.214.3 | attackspambots | web Attack on Website at 2020-02-05. | 2020-02-06 17:27:00 | 
| 78.186.153.82 | attackspambots | Honeypot attack, port: 81, PTR: 78.186.153.82.static.ttnet.com.tr. | 2020-02-06 17:36:57 | 
| 14.160.243.25 | attack | Feb 6 05:53:20 mail sshd\[14250\]: Invalid user admin2 from 14.160.243.25 Feb 6 05:53:21 mail sshd\[14250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.160.243.25 Feb 6 05:53:24 mail sshd\[14250\]: Failed password for invalid user admin2 from 14.160.243.25 port 50479 ssh2 ... | 2020-02-06 17:41:58 | 
| 42.115.214.150 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found | 2020-02-06 17:44:44 | 
| 109.68.174.3 | attackbotsspam | web Attack on Website at 2020-02-05. | 2020-02-06 17:37:36 | 
| 107.180.92.3 | attackbotsspam | Feb 6 08:53:30 sigma sshd\[3728\]: Invalid user amn from 107.180.92.3Feb 6 08:53:31 sigma sshd\[3728\]: Failed password for invalid user amn from 107.180.92.3 port 26450 ssh2 ... | 2020-02-06 17:11:59 | 
| 167.71.72.70 | attackspambots | Unauthorized connection attempt detected from IP address 167.71.72.70 to port 2220 [J] | 2020-02-06 17:08:27 | 
| 106.248.228.114 | attackspam | Brute force SMTP login attempted. ... | 2020-02-06 17:24:20 | 
| 188.98.7.209 | attackspam | Unauthorized connection attempt detected from IP address 188.98.7.209 to port 2220 [J] | 2020-02-06 17:00:08 | 
| 106.51.140.242 | attack | Honeypot attack, port: 445, PTR: broadband.actcorp.in. | 2020-02-06 17:19:45 | 
| 105.186.234.2 | attackbotsspam | SSH login attempts with user root at 2020-02-05. | 2020-02-06 17:43:50 | 
| 14.102.94.8 | attackspambots | web Attack on Website at 2020-02-05. | 2020-02-06 17:01:21 | 
| 139.162.122.1 | attackspam | SSH login attempts with user root at 2020-02-05. | 2020-02-06 17:03:04 | 
| 103.78.13.2 | attack | web Attack on Website at 2020-02-05. | 2020-02-06 17:49:13 | 
| 104.152.52.3 | attack | Brute-Force on ftp at 2020-02-05. | 2020-02-06 17:47:01 |