City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.40.77
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20941
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.22.40.77.			IN	A
;; AUTHORITY SECTION:
.			418	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:00:41 CST 2022
;; MSG SIZE  rcvd: 105
        Host 77.40.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 77.40.22.104.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 141.98.80.153 | attack | May 31 16:08:25 web1 postfix/smtpd\[30367\]: warning: unknown\[141.98.80.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 31 16:08:44 web1 postfix/smtpd\[30373\]: warning: unknown\[141.98.80.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 31 16:08:45 web1 postfix/smtpd\[30367\]: warning: unknown\[141.98.80.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6  | 
                    2020-05-31 22:13:06 | 
| 112.172.78.64 | attackspam | Unauthorized connection attempt detected from IP address 112.172.78.64 to port 23  | 
                    2020-05-31 22:19:10 | 
| 187.136.196.35 | attackspambots | Unauthorized connection attempt detected from IP address 187.136.196.35 to port 23  | 
                    2020-05-31 22:05:26 | 
| 50.193.111.17 | attackbotsspam | Unauthorized connection attempt detected from IP address 50.193.111.17 to port 25  | 
                    2020-05-31 21:54:44 | 
| 112.236.89.92 | attack | Unauthorized connection attempt detected from IP address 112.236.89.92 to port 23  | 
                    2020-05-31 22:18:39 | 
| 218.240.148.209 | attackbotsspam | Unauthorized connection attempt detected from IP address 218.240.148.209 to port 1433  | 
                    2020-05-31 22:35:20 | 
| 49.235.221.172 | attackspam | May 31 13:57:41 xeon sshd[513]: Failed password for root from 49.235.221.172 port 46342 ssh2  | 
                    2020-05-31 22:31:43 | 
| 220.82.85.90 | attack | Unauthorized connection attempt detected from IP address 220.82.85.90 to port 23  | 
                    2020-05-31 22:34:53 | 
| 52.167.1.233 | attack | Unauthorized connection attempt detected from IP address 52.167.1.233 to port 13389  | 
                    2020-05-31 22:31:04 | 
| 190.156.250.4 | attackspambots | Unauthorized connection attempt detected from IP address 190.156.250.4 to port 8080  | 
                    2020-05-31 22:05:02 | 
| 1.30.36.7 | attackspam | Unauthorized connection attempt detected from IP address 1.30.36.7 to port 23  | 
                    2020-05-31 21:58:21 | 
| 73.36.158.53 | attackbotsspam | Unauthorized connection attempt detected from IP address 73.36.158.53 to port 8000  | 
                    2020-05-31 21:51:06 | 
| 36.34.163.105 | attackbots | Unauthorized connection attempt detected from IP address 36.34.163.105 to port 26  | 
                    2020-05-31 21:57:29 | 
| 14.36.235.14 | attackspam | Unauthorized connection attempt detected from IP address 14.36.235.14 to port 81  | 
                    2020-05-31 21:58:03 | 
| 76.184.68.128 | attack | Unauthorized connection attempt detected from IP address 76.184.68.128 to port 5555  | 
                    2020-05-31 22:28:05 |