City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.35.245.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52915
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;104.35.245.64.			IN	A
;; AUTHORITY SECTION:
.			138	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 14:50:44 CST 2022
;; MSG SIZE  rcvd: 106
        64.245.35.104.in-addr.arpa domain name pointer cpe-104-35-245-64.socal.res.rr.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
64.245.35.104.in-addr.arpa	name = cpe-104-35-245-64.socal.res.rr.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 45.224.105.80 | attack | Sql/code injection probe  | 
                    2020-04-17 07:18:02 | 
| 113.190.37.142 | attack | SSH-bruteforce attempts  | 
                    2020-04-17 07:40:30 | 
| 65.19.174.198 | attackbotsspam | Port 15000 scan denied  | 
                    2020-04-17 07:11:06 | 
| 182.218.64.105 | attackbots | 2020-04-16T23:08:33.185561shield sshd\[15281\]: Invalid user east from 182.218.64.105 port 59739 2020-04-16T23:08:33.188462shield sshd\[15281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.218.64.105 2020-04-16T23:08:35.067393shield sshd\[15281\]: Failed password for invalid user east from 182.218.64.105 port 59739 ssh2 2020-04-16T23:12:25.746636shield sshd\[16327\]: Invalid user zheng from 182.218.64.105 port 51504 2020-04-16T23:12:25.750285shield sshd\[16327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.218.64.105  | 
                    2020-04-17 07:26:58 | 
| 218.239.223.83 | attack | 2020-04-16T17:31:58.244764linuxbox-skyline sshd[180593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.239.223.83 user=root 2020-04-16T17:32:00.671742linuxbox-skyline sshd[180593]: Failed password for root from 218.239.223.83 port 50303 ssh2 ...  | 
                    2020-04-17 07:39:01 | 
| 45.55.177.170 | attackspambots | Apr 17 06:24:46 webhost01 sshd[20554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.177.170 Apr 17 06:24:49 webhost01 sshd[20554]: Failed password for invalid user admin from 45.55.177.170 port 41676 ssh2 ...  | 
                    2020-04-17 07:33:27 | 
| 148.228.15.4 | attack | SSH brute-force attempt  | 
                    2020-04-17 07:42:04 | 
| 106.13.78.120 | attackspam | Apr 16 20:34:01 *** sshd[6808]: Invalid user jl from 106.13.78.120  | 
                    2020-04-17 07:20:54 | 
| 119.47.90.197 | attackbots | Apr 17 00:55:01 ourumov-web sshd\[26630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.47.90.197 user=root Apr 17 00:55:03 ourumov-web sshd\[26630\]: Failed password for root from 119.47.90.197 port 53350 ssh2 Apr 17 01:11:13 ourumov-web sshd\[28050\]: Invalid user it from 119.47.90.197 port 51540 ...  | 
                    2020-04-17 07:24:53 | 
| 51.15.129.164 | attackbotsspam | $f2bV_matches  | 
                    2020-04-17 07:28:46 | 
| 218.240.137.68 | attackbots | Apr 17 01:23:15 prox sshd[16810]: Failed password for root from 218.240.137.68 port 43630 ssh2 Apr 17 01:33:54 prox sshd[10969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.240.137.68  | 
                    2020-04-17 07:45:45 | 
| 64.225.14.108 | attackspambots | Port 20897 scan denied  | 
                    2020-04-17 07:11:32 | 
| 137.220.138.137 | attackspam | Apr 16 23:56:02 [host] sshd[18291]: pam_unix(sshd: Apr 16 23:56:04 [host] sshd[18291]: Failed passwor Apr 17 00:05:12 [host] sshd[18554]: Invalid user a  | 
                    2020-04-17 07:33:09 | 
| 43.243.136.253 | attackbotsspam | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-04-17 07:16:21 | 
| 68.228.98.246 | attackspam | Repeated brute force against a port  | 
                    2020-04-17 07:46:59 |