City: unknown
Region: unknown
Country: Korea (the Republic of)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.97.66.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.97.66.29.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:40:10 CST 2025
;; MSG SIZE  rcvd: 105
        Host 29.66.97.106.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 29.66.97.106.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 222.186.175.183 | attackbotsspam | Nov 7 09:52:04 TORMINT sshd\[12208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183 user=root Nov 7 09:52:06 TORMINT sshd\[12208\]: Failed password for root from 222.186.175.183 port 17790 ssh2 Nov 7 09:52:10 TORMINT sshd\[12208\]: Failed password for root from 222.186.175.183 port 17790 ssh2 ...  | 
                    2019-11-07 22:56:15 | 
| 93.114.86.226 | attack | 93.114.86.226 - - [07/Nov/2019:15:48:03 +0100] "POST /wp-login.php HTTP/1.1" 200 2112 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 93.114.86.226 - - [07/Nov/2019:15:48:03 +0100] "POST /wp-login.php HTTP/1.1" 200 2093 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" ...  | 
                    2019-11-07 23:43:39 | 
| 45.125.65.99 | attackspambots | \[2019-11-07 10:10:27\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T10:10:27.525-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="6073701148343508002",SessionID="0x7fdf2c8a8ab8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.99/63996",ACLName="no_extension_match" \[2019-11-07 10:11:08\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T10:11:08.283-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="6402501148556213011",SessionID="0x7fdf2c7cd048",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.99/49478",ACLName="no_extension_match" \[2019-11-07 10:11:29\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T10:11:29.712-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="6737301148585359060",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.99/60652",ACLNam  | 
                    2019-11-07 23:20:16 | 
| 61.250.146.12 | attackbots | Lines containing failures of 61.250.146.12 Nov 5 13:51:18 nextcloud sshd[29393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.250.146.12 user=r.r Nov 5 13:51:21 nextcloud sshd[29393]: Failed password for r.r from 61.250.146.12 port 34720 ssh2 Nov 5 13:51:21 nextcloud sshd[29393]: Received disconnect from 61.250.146.12 port 34720:11: Bye Bye [preauth] Nov 5 13:51:21 nextcloud sshd[29393]: Disconnected from authenticating user r.r 61.250.146.12 port 34720 [preauth] Nov 5 14:06:53 nextcloud sshd[2004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.250.146.12 user=r.r Nov 5 14:06:55 nextcloud sshd[2004]: Failed password for r.r from 61.250.146.12 port 34616 ssh2 Nov 5 14:06:56 nextcloud sshd[2004]: Received disconnect from 61.250.146.12 port 34616:11: Bye Bye [preauth] Nov 5 14:06:56 nextcloud sshd[2004]: Disconnected from authenticating user r.r 61.250.146.12 port 34616 [pre........ ------------------------------  | 
                    2019-11-07 23:19:41 | 
| 106.52.50.225 | attack | Nov 7 05:22:57 php1 sshd\[11061\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.50.225 user=root Nov 7 05:22:59 php1 sshd\[11061\]: Failed password for root from 106.52.50.225 port 35352 ssh2 Nov 7 05:27:58 php1 sshd\[11428\]: Invalid user rizal from 106.52.50.225 Nov 7 05:27:58 php1 sshd\[11428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.50.225 Nov 7 05:28:01 php1 sshd\[11428\]: Failed password for invalid user rizal from 106.52.50.225 port 35710 ssh2  | 
                    2019-11-07 23:34:55 | 
| 14.161.16.62 | attackspambots | Nov 7 05:01:03 php1 sshd\[1684\]: Invalid user stan from 14.161.16.62 Nov 7 05:01:03 php1 sshd\[1684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.16.62 Nov 7 05:01:05 php1 sshd\[1684\]: Failed password for invalid user stan from 14.161.16.62 port 54780 ssh2 Nov 7 05:05:27 php1 sshd\[2218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.16.62 user=root Nov 7 05:05:30 php1 sshd\[2218\]: Failed password for root from 14.161.16.62 port 37576 ssh2  | 
                    2019-11-07 23:25:08 | 
| 159.203.81.129 | attackspambots | 159.203.81.129 was recorded 366 times by 12 hosts attempting to connect to the following ports: 8088. Incident counter (4h, 24h, all-time): 366, 2185, 3517  | 
                    2019-11-07 23:28:26 | 
| 89.45.17.11 | attackspam | 2019-11-07T15:41:32.379564lon01.zurich-datacenter.net sshd\[22484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.17.11 user=root 2019-11-07T15:41:34.005043lon01.zurich-datacenter.net sshd\[22484\]: Failed password for root from 89.45.17.11 port 53524 ssh2 2019-11-07T15:45:11.866640lon01.zurich-datacenter.net sshd\[22565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.17.11 user=root 2019-11-07T15:45:13.888645lon01.zurich-datacenter.net sshd\[22565\]: Failed password for root from 89.45.17.11 port 44005 ssh2 2019-11-07T15:49:04.283815lon01.zurich-datacenter.net sshd\[22623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.45.17.11 user=root ...  | 
                    2019-11-07 23:00:23 | 
| 222.186.175.202 | attackspam | Nov 7 16:01:22 rotator sshd\[11662\]: Failed password for root from 222.186.175.202 port 64516 ssh2Nov 7 16:01:27 rotator sshd\[11662\]: Failed password for root from 222.186.175.202 port 64516 ssh2Nov 7 16:01:31 rotator sshd\[11662\]: Failed password for root from 222.186.175.202 port 64516 ssh2Nov 7 16:01:36 rotator sshd\[11662\]: Failed password for root from 222.186.175.202 port 64516 ssh2Nov 7 16:01:40 rotator sshd\[11662\]: Failed password for root from 222.186.175.202 port 64516 ssh2Nov 7 16:01:53 rotator sshd\[11665\]: Failed password for root from 222.186.175.202 port 2534 ssh2 ...  | 
                    2019-11-07 23:16:02 | 
| 140.143.249.234 | attackbotsspam | Nov 7 16:26:06 mail sshd[26583]: Failed password for root from 140.143.249.234 port 39956 ssh2 Nov 7 16:31:21 mail sshd[28120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.249.234 Nov 7 16:31:23 mail sshd[28120]: Failed password for invalid user ourhomes from 140.143.249.234 port 42126 ssh2  | 
                    2019-11-07 23:36:51 | 
| 112.33.13.124 | attackspam | Nov 7 16:08:07 SilenceServices sshd[22151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.13.124 Nov 7 16:08:09 SilenceServices sshd[22151]: Failed password for invalid user user1 from 112.33.13.124 port 52860 ssh2 Nov 7 16:14:46 SilenceServices sshd[24117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.13.124  | 
                    2019-11-07 23:34:06 | 
| 41.188.115.245 | attackspam | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -  | 
                    2019-11-07 23:06:28 | 
| 52.41.158.217 | attackbots | 11/07/2019-16:37:02.425128 52.41.158.217 Protocol: 6 SURICATA TLS invalid record/traffic  | 
                    2019-11-07 23:44:14 | 
| 51.255.42.250 | attackbots | Nov 7 05:13:47 eddieflores sshd\[27203\]: Invalid user io from 51.255.42.250 Nov 7 05:13:47 eddieflores sshd\[27203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=250.ip-51-255-42.eu Nov 7 05:13:49 eddieflores sshd\[27203\]: Failed password for invalid user io from 51.255.42.250 port 55757 ssh2 Nov 7 05:20:47 eddieflores sshd\[27756\]: Invalid user user from 51.255.42.250 Nov 7 05:20:47 eddieflores sshd\[27756\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=250.ip-51-255-42.eu  | 
                    2019-11-07 23:34:22 | 
| 45.82.153.42 | attackspam | 11/07/2019-15:48:19.457222 45.82.153.42 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 44  | 
                    2019-11-07 23:32:13 |