City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.100.116.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53287
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;114.100.116.164.		IN	A
;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400
;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 14:18:20 CST 2022
;; MSG SIZE  rcvd: 108Host 164.116.100.114.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 164.116.100.114.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 92.118.160.29 | attackspam | Automatic report - Banned IP Access | 2020-10-11 03:13:48 | 
| 198.50.136.143 | attack | SSH Brute-Forcing (server2) | 2020-10-11 03:37:37 | 
| 222.240.169.12 | attackspambots | 2020-10-10 06:21:42.548246-0500 localhost sshd[3032]: Failed password for root from 222.240.169.12 port 41662 ssh2 | 2020-10-11 03:17:42 | 
| 14.142.219.150 | attackspambots | Unauthorized connection attempt from IP address 14.142.219.150 on Port 445(SMB) | 2020-10-11 03:29:20 | 
| 200.73.129.6 | attackspambots | Oct 10 20:19:16 santamaria sshd\[10773\]: Invalid user mongodb from 200.73.129.6 Oct 10 20:19:16 santamaria sshd\[10773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.129.6 Oct 10 20:19:17 santamaria sshd\[10773\]: Failed password for invalid user mongodb from 200.73.129.6 port 39744 ssh2 ... | 2020-10-11 03:04:35 | 
| 85.209.0.103 | attack | Oct 10 20:04:20 router sshd[3688]: Failed password for root from 85.209.0.103 port 64082 ssh2 ... | 2020-10-11 03:14:30 | 
| 89.248.172.16 | attack | ET DROP Dshield Block Listed Source group 1 - port: 60001 proto: tcp cat: Misc Attackbytes: 60 | 2020-10-11 03:06:34 | 
| 190.64.141.18 | attackspambots | Oct 10 19:53:13 vps639187 sshd\[12864\]: Invalid user br from 190.64.141.18 port 47587 Oct 10 19:53:13 vps639187 sshd\[12864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.141.18 Oct 10 19:53:15 vps639187 sshd\[12864\]: Failed password for invalid user br from 190.64.141.18 port 47587 ssh2 ... | 2020-10-11 03:31:24 | 
| 42.112.16.126 | attackspam | Unauthorized connection attempt from IP address 42.112.16.126 on Port 445(SMB) | 2020-10-11 03:07:31 | 
| 182.124.206.38 | attackbotsspam | [N3.H3.VM3] Port Scanner Detected Blocked by UFW | 2020-10-11 03:18:10 | 
| 190.198.215.93 | attackbots | Unauthorized connection attempt from IP address 190.198.215.93 on Port 445(SMB) | 2020-10-11 03:30:25 | 
| 195.154.243.19 | attack | Invalid user test from 195.154.243.19 port 57788 | 2020-10-11 03:17:53 | 
| 35.203.68.135 | attackspam | 2020-10-10T18:45:40.178701abusebot-4.cloudsearch.cf sshd[18671]: Invalid user sales from 35.203.68.135 port 41048 2020-10-10T18:45:40.185983abusebot-4.cloudsearch.cf sshd[18671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.68.203.35.bc.googleusercontent.com 2020-10-10T18:45:40.178701abusebot-4.cloudsearch.cf sshd[18671]: Invalid user sales from 35.203.68.135 port 41048 2020-10-10T18:45:42.133009abusebot-4.cloudsearch.cf sshd[18671]: Failed password for invalid user sales from 35.203.68.135 port 41048 ssh2 2020-10-10T18:48:53.916358abusebot-4.cloudsearch.cf sshd[18728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.68.203.35.bc.googleusercontent.com user=bin 2020-10-10T18:48:55.693043abusebot-4.cloudsearch.cf sshd[18728]: Failed password for bin from 35.203.68.135 port 46328 ssh2 2020-10-10T18:52:11.648235abusebot-4.cloudsearch.cf sshd[18739]: Invalid user arthur from 35.203.68.135 port 51614 ... | 2020-10-11 03:35:20 | 
| 192.241.239.143 | attackspam | ET DROP Dshield Block Listed Source group 1 - port: 88 proto: tcp cat: Misc Attackbytes: 60 | 2020-10-11 03:33:09 | 
| 45.173.196.82 | attackspambots | Unauthorized connection attempt from IP address 45.173.196.82 on Port 445(SMB) | 2020-10-11 03:12:46 |