City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.242.110.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 541
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;107.242.110.111.		IN	A
;; AUTHORITY SECTION:
.			133	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 12:39:17 CST 2022
;; MSG SIZE  rcvd: 108Host 111.110.242.107.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 111.110.242.107.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 123.16.13.240 | attackspambots | Honeypot attack, port: 445, PTR: static.vnpt.vn. | 2020-02-02 18:49:30 | 
| 120.79.101.224 | attackspam | Feb 2 05:52:05 srv01 sshd[30841]: Invalid user test from 120.79.101.224 port 23560 Feb 2 05:52:05 srv01 sshd[30841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.79.101.224 Feb 2 05:52:05 srv01 sshd[30841]: Invalid user test from 120.79.101.224 port 23560 Feb 2 05:52:07 srv01 sshd[30841]: Failed password for invalid user test from 120.79.101.224 port 23560 ssh2 Feb 2 05:52:05 srv01 sshd[30841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.79.101.224 Feb 2 05:52:05 srv01 sshd[30841]: Invalid user test from 120.79.101.224 port 23560 Feb 2 05:52:07 srv01 sshd[30841]: Failed password for invalid user test from 120.79.101.224 port 23560 ssh2 ... | 2020-02-02 18:29:24 | 
| 153.121.58.149 | attack | Unauthorized connection attempt detected from IP address 153.121.58.149 to port 2220 [J] | 2020-02-02 18:57:31 | 
| 222.186.15.166 | attack | Unauthorized connection attempt detected from IP address 222.186.15.166 to port 22 [J] | 2020-02-02 18:55:34 | 
| 121.204.166.240 | attack | Unauthorized connection attempt detected from IP address 121.204.166.240 to port 2220 [J] | 2020-02-02 18:45:32 | 
| 171.88.46.173 | attackbots | CN China - Failures: 20 ftpd | 2020-02-02 18:13:45 | 
| 106.12.198.77 | attack | Feb 2 00:13:06 wbs sshd\[23252\]: Invalid user 12345 from 106.12.198.77 Feb 2 00:13:06 wbs sshd\[23252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.198.77 Feb 2 00:13:08 wbs sshd\[23252\]: Failed password for invalid user 12345 from 106.12.198.77 port 59394 ssh2 Feb 2 00:15:07 wbs sshd\[23281\]: Invalid user cacti from 106.12.198.77 Feb 2 00:15:07 wbs sshd\[23281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.198.77 | 2020-02-02 18:25:43 | 
| 219.141.211.74 | attackbots | 2020-02-02T10:20:47.899906shield sshd\[16054\]: Invalid user nologin from 219.141.211.74 port 46922 2020-02-02T10:20:47.906645shield sshd\[16054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.141.211.74 2020-02-02T10:20:50.133323shield sshd\[16054\]: Failed password for invalid user nologin from 219.141.211.74 port 46922 ssh2 2020-02-02T10:20:53.750848shield sshd\[16060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.141.211.74 user=root 2020-02-02T10:20:55.801898shield sshd\[16060\]: Failed password for root from 219.141.211.74 port 50938 ssh2 | 2020-02-02 18:37:57 | 
| 59.8.160.199 | attackspam | Honeypot attack, port: 5555, PTR: PTR record not found | 2020-02-02 18:47:43 | 
| 103.40.123.18 | attackbots | Honeypot attack, port: 445, PTR: ip-18.123.40.jogjaringan.net.id. | 2020-02-02 18:20:13 | 
| 180.242.182.43 | attackspam | Port scan on 1 port(s): 4899 | 2020-02-02 18:41:03 | 
| 157.32.92.25 | attackbots | 1580619124 - 02/02/2020 05:52:04 Host: 157.32.92.25/157.32.92.25 Port: 445 TCP Blocked | 2020-02-02 18:31:44 | 
| 206.189.177.133 | attackspambots | Unauthorized connection attempt detected from IP address 206.189.177.133 to port 8545 [J] | 2020-02-02 18:44:09 | 
| 187.154.188.221 | attack | unauthorized connection attempt | 2020-02-02 18:57:01 | 
| 5.74.24.154 | attack | Unauthorized connection attempt detected from IP address 5.74.24.154 to port 23 [J] | 2020-02-02 18:35:53 |