City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.100.189.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;114.100.189.241.		IN	A
;; AUTHORITY SECTION:
.			526	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400
;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 14:20:21 CST 2022
;; MSG SIZE  rcvd: 108
        Host 241.189.100.114.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 241.189.100.114.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 90.180.92.121 | attack | Bruteforce detected by fail2ban  | 
                    2020-04-30 03:34:39 | 
| 220.106.13.14 | attack | Failed password for root from 220.106.13.14 port 49880 ssh2  | 
                    2020-04-30 03:47:15 | 
| 128.199.165.221 | attackspam | Invalid user vk from 128.199.165.221 port 6837  | 
                    2020-04-30 04:03:09 | 
| 134.175.161.251 | attackbotsspam | Failed password for root from 134.175.161.251 port 34120 ssh2  | 
                    2020-04-30 03:25:52 | 
| 122.51.136.99 | attackbotsspam | Invalid user zhuhan from 122.51.136.99 port 36830  | 
                    2020-04-30 04:04:37 | 
| 121.241.244.92 | attack | 2020-04-29T19:57:33.655707shield sshd\[27604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92 user=root 2020-04-29T19:57:35.410655shield sshd\[27604\]: Failed password for root from 121.241.244.92 port 50062 ssh2 2020-04-29T19:59:06.576076shield sshd\[27814\]: Invalid user gw from 121.241.244.92 port 56421 2020-04-29T19:59:06.580239shield sshd\[27814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92 2020-04-29T19:59:08.097346shield sshd\[27814\]: Failed password for invalid user gw from 121.241.244.92 port 56421 ssh2  | 
                    2020-04-30 04:05:01 | 
| 104.248.230.93 | attackbotsspam | 2020-04-27 11:59:36 server sshd[41748]: Failed password for invalid user zy from 104.248.230.93 port 37590 ssh2  | 
                    2020-04-30 03:32:32 | 
| 94.198.110.205 | attackbots | Invalid user gu from 94.198.110.205 port 59811  | 
                    2020-04-30 03:34:14 | 
| 106.12.200.160 | attackspambots | (sshd) Failed SSH login from 106.12.200.160 (CN/China/-): 5 in the last 3600 secs  | 
                    2020-04-30 03:31:42 | 
| 129.144.9.93 | attack | Invalid user bd from 129.144.9.93 port 41764  | 
                    2020-04-30 04:02:43 | 
| 211.140.196.90 | attackspam | Invalid user user2 from 211.140.196.90 port 40854  | 
                    2020-04-30 03:50:20 | 
| 110.166.82.211 | attackspam | Failed password for root from 110.166.82.211 port 50316 ssh2  | 
                    2020-04-30 03:29:31 | 
| 190.151.144.57 | attack | Invalid user froggie from 190.151.144.57 port 47624  | 
                    2020-04-30 03:53:07 | 
| 139.59.249.255 | attack | leo_www  | 
                    2020-04-30 03:23:53 | 
| 85.121.89.192 | attackspam | Failed password for root from 85.121.89.192 port 47198 ssh2  | 
                    2020-04-30 03:35:03 |