City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.40.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22306
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.22.40.114.			IN	A
;; AUTHORITY SECTION:
.			166	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:00:38 CST 2022
;; MSG SIZE  rcvd: 106
        Host 114.40.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 114.40.22.104.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 141.98.80.30 | attackbotsspam | Apr 15 09:12:29 mail.srvfarm.net postfix/smtpd[2077768]: warning: unknown[141.98.80.30]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Apr 15 09:12:29 mail.srvfarm.net postfix/smtpd[2077768]: lost connection after AUTH from unknown[141.98.80.30] Apr 15 09:12:34 mail.srvfarm.net postfix/smtpd[2065982]: lost connection after CONNECT from unknown[141.98.80.30] Apr 15 09:12:38 mail.srvfarm.net postfix/smtpd[2064212]: lost connection after AUTH from unknown[141.98.80.30] Apr 15 09:12:43 mail.srvfarm.net postfix/smtpd[2079033]: lost connection after CONNECT from unknown[141.98.80.30]  | 
                    2020-04-15 15:33:11 | 
| 114.219.56.219 | attackbots | Apr 15 08:58:40 * sshd[25731]: Failed password for root from 114.219.56.219 port 45812 ssh2  | 
                    2020-04-15 15:27:29 | 
| 159.65.137.23 | attackbotsspam | Invalid user nisec from 159.65.137.23 port 46938  | 
                    2020-04-15 15:15:57 | 
| 123.231.167.2 | attack | Attempt to attack host OS, exploiting network vulnerabilities, on 15-04-2020 04:55:09.  | 
                    2020-04-15 15:27:07 | 
| 122.51.158.15 | attack | Invalid user server from 122.51.158.15 port 38826  | 
                    2020-04-15 15:19:10 | 
| 186.146.1.122 | attackbotsspam | Automatic report BANNED IP  | 
                    2020-04-15 15:14:32 | 
| 80.211.114.30 | attack | Apr 15 07:11:35 localhost sshd[4450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.114.30 user=bin Apr 15 07:11:36 localhost sshd[4450]: Failed password for bin from 80.211.114.30 port 47884 ssh2 Apr 15 07:15:24 localhost sshd[4849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.114.30 user=root Apr 15 07:15:26 localhost sshd[4849]: Failed password for root from 80.211.114.30 port 56720 ssh2 Apr 15 07:19:09 localhost sshd[5225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.114.30 user=root Apr 15 07:19:11 localhost sshd[5225]: Failed password for root from 80.211.114.30 port 37314 ssh2 ...  | 
                    2020-04-15 15:30:14 | 
| 104.248.116.140 | attackspam | 2020-04-15T09:19:30.998050struts4.enskede.local sshd\[26027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.116.140 user=root 2020-04-15T09:19:34.066355struts4.enskede.local sshd\[26027\]: Failed password for root from 104.248.116.140 port 45720 ssh2 2020-04-15T09:20:47.531999struts4.enskede.local sshd\[26052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.116.140 user=root 2020-04-15T09:20:50.459609struts4.enskede.local sshd\[26052\]: Failed password for root from 104.248.116.140 port 35458 ssh2 2020-04-15T09:21:39.992484struts4.enskede.local sshd\[26075\]: Invalid user ntps from 104.248.116.140 port 48992 ...  | 
                    2020-04-15 15:37:44 | 
| 67.219.148.155 | attackbotsspam | SpamScore above: 10.0  | 
                    2020-04-15 15:35:09 | 
| 222.186.30.167 | attackspam | 2020-04-15T00:43:00.116633homeassistant sshd[26383]: Failed password for root from 222.186.30.167 port 63474 ssh2 2020-04-15T07:27:54.799235homeassistant sshd[31557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167 user=root ...  | 
                    2020-04-15 15:34:05 | 
| 45.9.237.16 | attack | Fail2Ban Ban Triggered  | 
                    2020-04-15 15:09:22 | 
| 196.188.42.130 | attackbotsspam | 2020-04-15T04:14:50.927725shield sshd\[7447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.188.42.130 user=root 2020-04-15T04:14:53.217205shield sshd\[7447\]: Failed password for root from 196.188.42.130 port 44818 ssh2 2020-04-15T04:24:47.231863shield sshd\[9111\]: Invalid user syslog from 196.188.42.130 port 49293 2020-04-15T04:24:47.235478shield sshd\[9111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.188.42.130 2020-04-15T04:24:49.148584shield sshd\[9111\]: Failed password for invalid user syslog from 196.188.42.130 port 49293 ssh2  | 
                    2020-04-15 15:15:00 | 
| 222.186.52.86 | attackspam | Apr 15 09:20:37 OPSO sshd\[12054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.86 user=root Apr 15 09:20:39 OPSO sshd\[12054\]: Failed password for root from 222.186.52.86 port 44503 ssh2 Apr 15 09:20:41 OPSO sshd\[12054\]: Failed password for root from 222.186.52.86 port 44503 ssh2 Apr 15 09:20:44 OPSO sshd\[12054\]: Failed password for root from 222.186.52.86 port 44503 ssh2 Apr 15 09:21:57 OPSO sshd\[12191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.86 user=root  | 
                    2020-04-15 15:22:16 | 
| 66.42.114.72 | attackspam | 15-Apr-2020 06:43:36.381 client @0x7f649c1457e0 66.42.114.72#60348 (yahoo.qpon): view external: query (cache) 'yahoo.qpon/A/IN' denied 15-Apr-2020 06:43:36.381 client @0x7f64a40c72f0 66.42.114.72#23513 (yahoo.forex): view external: query (cache) 'yahoo.forex/A/IN' denied 15-Apr-2020 06:43:36.381 client @0x7f649c1219e0 66.42.114.72#58887 (yahoo.site): view external: query (cache) 'yahoo.site/A/IN' denied  | 
                    2020-04-15 15:02:51 | 
| 115.207.21.223 | attack | postfix  | 
                    2020-04-15 15:24:07 |