City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.7.64.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56437
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;114.7.64.20.			IN	A
;; AUTHORITY SECTION:
.			175	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040402 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 05 21:46:16 CST 2022
;; MSG SIZE  rcvd: 104
        20.64.7.114.in-addr.arpa domain name pointer 114-7-64-20.resources.indosat.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
20.64.7.114.in-addr.arpa	name = 114-7-64-20.resources.indosat.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 190.202.15.166 | attackbotsspam | 445/tcp 445/tcp 445/tcp... [2019-12-14/2020-01-27]4pkt,1pt.(tcp)  | 
                    2020-01-28 03:15:11 | 
| 93.147.156.161 | attackspambots | 2019-02-27 10:20:58 H=net-93-147-156-161.cust.vodafonedsl.it \[93.147.156.161\]:62630 I=\[193.107.88.166\]:25 F=\  | 
                    2020-01-28 03:29:39 | 
| 186.48.76.160 | attackspam | Unauthorized connection attempt detected from IP address 186.48.76.160 to port 22 [J]  | 
                    2020-01-28 03:24:05 | 
| 31.134.123.251 | attackbots | 1433/tcp 1433/tcp [2020-01-02/27]2pkt  | 
                    2020-01-28 03:32:52 | 
| 187.177.73.6 | attackspam | MultiHost/MultiPort Probe, Scan, Hack -  | 
                    2020-01-28 03:15:40 | 
| 89.40.117.47 | attackbotsspam | Unauthorized connection attempt detected from IP address 89.40.117.47 to port 2220 [J]  | 
                    2020-01-28 03:04:15 | 
| 94.177.215.195 | attackspam | Jan 27 18:37:17 marvibiene sshd[25944]: Invalid user course from 94.177.215.195 port 42954 Jan 27 18:37:17 marvibiene sshd[25944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.215.195 Jan 27 18:37:17 marvibiene sshd[25944]: Invalid user course from 94.177.215.195 port 42954 Jan 27 18:37:20 marvibiene sshd[25944]: Failed password for invalid user course from 94.177.215.195 port 42954 ssh2 ...  | 
                    2020-01-28 02:59:10 | 
| 45.227.253.146 | attackspambots | 21 attempts against mh_ha-misbehave-ban on shade  | 
                    2020-01-28 03:24:54 | 
| 120.31.56.111 | attackspambots | Portscan or hack attempt detected by psad/fwsnort  | 
                    2020-01-28 03:25:34 | 
| 93.168.163.206 | attackbots | 2019-07-07 19:19:06 1hkAob-000687-5Z SMTP connection from \(\[93.168.163.206\]\) \[93.168.163.206\]:1454 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-07 19:19:16 1hkAom-00068D-33 SMTP connection from \(\[93.168.163.206\]\) \[93.168.163.206\]:2052 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-07 19:19:21 1hkAor-00068H-9H SMTP connection from \(\[93.168.163.206\]\) \[93.168.163.206\]:1928 I=\[193.107.88.166\]:25 closed by DROP in ACL ...  | 
                    2020-01-28 03:22:06 | 
| 93.169.179.143 | attackbotsspam | 2019-07-08 03:45:32 1hkIii-0000G3-6Y SMTP connection from \(\[93.169.179.143\]\) \[93.169.179.143\]:1606 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-08 03:45:38 1hkIin-0000GD-JM SMTP connection from \(\[93.169.179.143\]\) \[93.169.179.143\]:1873 I=\[193.107.88.166\]:25 closed by DROP in ACL 2019-07-08 03:45:41 1hkIir-0000GF-4q SMTP connection from \(\[93.169.179.143\]\) \[93.169.179.143\]:1728 I=\[193.107.88.166\]:25 closed by DROP in ACL ...  | 
                    2020-01-28 03:16:36 | 
| 222.186.175.217 | attackspambots | Jan 27 19:58:58 legacy sshd[10966]: Failed password for root from 222.186.175.217 port 7042 ssh2 Jan 27 19:59:11 legacy sshd[10966]: error: maximum authentication attempts exceeded for root from 222.186.175.217 port 7042 ssh2 [preauth] Jan 27 19:59:17 legacy sshd[10978]: Failed password for root from 222.186.175.217 port 20522 ssh2 ...  | 
                    2020-01-28 03:00:46 | 
| 176.31.182.125 | attackspambots | Jan 27 20:00:00 sd-53420 sshd\[23971\]: Invalid user rstudio from 176.31.182.125 Jan 27 20:00:00 sd-53420 sshd\[23971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.182.125 Jan 27 20:00:02 sd-53420 sshd\[23971\]: Failed password for invalid user rstudio from 176.31.182.125 port 33293 ssh2 Jan 27 20:01:06 sd-53420 sshd\[24238\]: Invalid user dl from 176.31.182.125 Jan 27 20:01:06 sd-53420 sshd\[24238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.182.125 ...  | 
                    2020-01-28 03:05:47 | 
| 93.174.89.55 | attack | 2019-12-02 04:12:39 H=\(vY6vo9\) \[93.174.89.55\]:55279 I=\[193.107.88.166\]:587 F=\  | 
                    2020-01-28 03:11:40 | 
| 217.195.206.19 | attack | 9090/tcp 9090/tcp 9090/tcp... [2020-01-15/27]7pkt,1pt.(tcp)  | 
                    2020-01-28 03:25:13 |