City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.13.85.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34189
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.13.85.106.			IN	A
;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:46:45 CST 2022
;; MSG SIZE  rcvd: 106
        106.85.13.107.in-addr.arpa domain name pointer mta-107-13-85-106.nc.rr.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
106.85.13.107.in-addr.arpa	name = mta-107-13-85-106.nc.rr.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 93.29.187.145 | attackbots | Apr 30 00:39:52 NPSTNNYC01T sshd[2806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.29.187.145 Apr 30 00:39:54 NPSTNNYC01T sshd[2806]: Failed password for invalid user localhost from 93.29.187.145 port 48582 ssh2 Apr 30 00:44:44 NPSTNNYC01T sshd[3404]: Failed password for root from 93.29.187.145 port 57980 ssh2 ...  | 
                    2020-04-30 14:57:07 | 
| 54.66.124.255 | attackbots | RDP Brute-Force (honeypot 2)  | 
                    2020-04-30 14:47:41 | 
| 134.122.106.228 | attackbots | Invalid user edu from 134.122.106.228 port 51090  | 
                    2020-04-30 14:40:57 | 
| 222.186.30.218 | attackbotsspam | IP blocked  | 
                    2020-04-30 14:27:34 | 
| 104.40.64.220 | attackbots | mail auth brute force  | 
                    2020-04-30 14:33:03 | 
| 45.254.26.25 | attack | Unauthorized connection attempt detected from IP address 45.254.26.25 to port 5900  | 
                    2020-04-30 14:49:29 | 
| 193.118.53.194 | attackbotsspam | Unauthorized connection attempt detected from IP address 193.118.53.194 to port 443  | 
                    2020-04-30 14:25:35 | 
| 202.181.171.227 | attackspambots | Honeypot attack, port: 445, PTR: PTR record not found  | 
                    2020-04-30 14:27:45 | 
| 159.203.198.34 | attackspam | $f2bV_matches  | 
                    2020-04-30 14:40:36 | 
| 31.13.115.2 | attack | [Thu Apr 30 11:25:50.153283 2020] [:error] [pid 20443:tid 140693016954624] [client 31.13.115.2:51946] [client 31.13.115.2] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/script-v32.js"] [unique_id "XqpTTk70qnkBKhQpBbErBQABxAM"] ...  | 
                    2020-04-30 14:46:59 | 
| 106.4.198.159 | attackspam | Brute force blocker - service: proftpd1 - aantal: 155 - Wed Jun 20 12:15:20 2018  | 
                    2020-04-30 14:41:50 | 
| 218.72.67.63 | attackbots | lfd: (smtpauth) Failed SMTP AUTH login from 218.72.67.63 (63.67.72.218.broad.hz.zj.dynamic.163data.com.cn): 5 in the last 3600 secs - Wed Jun 20 22:17:49 2018  | 
                    2020-04-30 14:37:24 | 
| 106.13.20.61 | attackbots | Apr 30 08:07:37 home sshd[21735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.20.61 Apr 30 08:07:39 home sshd[21735]: Failed password for invalid user wiktor from 106.13.20.61 port 44560 ssh2 Apr 30 08:10:46 home sshd[22311]: Failed password for root from 106.13.20.61 port 52222 ssh2 ...  | 
                    2020-04-30 14:49:58 | 
| 114.224.29.90 | attackbotsspam | lfd: (smtpauth) Failed SMTP AUTH login from 114.224.29.90 (-): 5 in the last 3600 secs - Wed Jun 20 22:49:22 2018  | 
                    2020-04-30 14:30:23 | 
| 114.225.83.20 | attackspambots | lfd: (smtpauth) Failed SMTP AUTH login from 114.225.83.20 (-): 5 in the last 3600 secs - Wed Jun 20 22:50:20 2018  | 
                    2020-04-30 14:28:06 |