City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.249.50.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29764
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;118.249.50.134.			IN	A
;; AUTHORITY SECTION:
.			279	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400
;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 17:18:55 CST 2022
;; MSG SIZE  rcvd: 107Host 134.50.249.118.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 134.50.249.118.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 45.71.237.42 | attackbotsspam | 2019-11-20 14:59:54 H=([45.71.237.42]) [45.71.237.42]:44436 I=[10.100.18.21]:25 F= | 2019-11-21 00:24:13 | 
| 123.24.54.82 | attack | Nov 20 15:32:39 seraph sshd[13837]: Invalid user admin from 123.24.54.82 Nov 20 15:32:39 seraph sshd[13837]: pam_unix(sshd:auth): authentication fai= lure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D123.24.54.82 Nov 20 15:32:40 seraph sshd[13837]: Failed password for invalid user admin = from 123.24.54.82 port 43932 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=123.24.54.82 | 2019-11-21 00:28:43 | 
| 91.121.211.59 | attack | Nov 20 15:37:33 Invalid user devyn from 91.121.211.59 port 50174 | 2019-11-21 00:49:47 | 
| 123.207.254.143 | attackbotsspam | HTTP: ThinkPHP Framework Code Injection Vulnerability | 2019-11-21 00:52:14 | 
| 41.58.253.121 | attack | Unauthorized connection attempt from IP address 41.58.253.121 on Port 445(SMB) | 2019-11-21 00:21:58 | 
| 198.96.155.3 | attack | Automatic report - XMLRPC Attack | 2019-11-21 00:22:14 | 
| 125.214.48.28 | attack | Unauthorized connection attempt from IP address 125.214.48.28 on Port 445(SMB) | 2019-11-21 00:42:55 | 
| 190.122.220.243 | attack | Automatic report - Port Scan Attack | 2019-11-21 00:26:57 | 
| 167.57.40.77 | attackbots | Fail2Ban Ban Triggered | 2019-11-21 00:41:59 | 
| 181.40.122.2 | attackspambots | SSH Bruteforce | 2019-11-21 00:23:18 | 
| 178.236.60.227 | attackbots | Unauthorised access (Nov 20) SRC=178.236.60.227 LEN=52 TTL=116 ID=25064 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Nov 19) SRC=178.236.60.227 LEN=52 TTL=117 ID=101 DF TCP DPT=445 WINDOW=8192 SYN Unauthorised access (Nov 18) SRC=178.236.60.227 LEN=52 TTL=117 ID=15428 DF TCP DPT=445 WINDOW=8192 SYN | 2019-11-21 00:54:13 | 
| 171.84.2.31 | attackbotsspam | Nov 20 15:39:12 vps01 sshd[27973]: Failed password for sshd from 171.84.2.31 port 44450 ssh2 Nov 20 15:44:55 vps01 sshd[27976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.84.2.31 Nov 20 15:44:58 vps01 sshd[27976]: Failed password for invalid user maroko from 171.84.2.31 port 9172 ssh2 | 2019-11-21 00:53:27 | 
| 165.227.28.181 | attack | Automatic report - XMLRPC Attack | 2019-11-21 00:59:20 | 
| 213.154.2.26 | attackbots | Unauthorized connection attempt from IP address 213.154.2.26 on Port 445(SMB) | 2019-11-21 00:47:10 | 
| 42.113.164.229 | attackspam | Unauthorized connection attempt from IP address 42.113.164.229 on Port 445(SMB) | 2019-11-21 00:24:43 |