City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.204.134.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54974
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;12.204.134.22.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 19:06:19 CST 2025
;; MSG SIZE  rcvd: 106Host 22.134.204.12.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 22.134.204.12.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 37.204.193.30 | attack | Attempted connection to port 445. | 2020-09-05 19:12:50 | 
| 89.248.174.39 | attackspam | 20 attacks on PHP URLs: 89.248.174.39 - - [04/Sep/2020:22:04:28 +0100] "GET /english/wp-login.php HTTP/1.1" 404 1121 "-" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)" | 2020-09-05 19:23:32 | 
| 89.133.45.112 | attack | Automatic report - Port Scan Attack | 2020-09-05 18:57:56 | 
| 184.22.193.211 | attackbotsspam | Attempted connection to port 445. | 2020-09-05 19:18:22 | 
| 178.205.253.206 | attackspam | 
 | 2020-09-05 19:18:58 | 
| 157.245.113.28 | attack | Port 22 Scan, PTR: None | 2020-09-05 18:46:48 | 
| 77.65.17.2 | attack | Invalid user sdtd from 77.65.17.2 port 35384 | 2020-09-05 18:52:08 | 
| 123.25.52.173 | attack | Unauthorized connection attempt from IP address 123.25.52.173 on Port 445(SMB) | 2020-09-05 18:59:32 | 
| 122.51.158.15 | attackspam | Sep 5 11:16:06 xeon sshd[50644]: Failed password for root from 122.51.158.15 port 56558 ssh2 | 2020-09-05 19:35:43 | 
| 221.126.242.254 | attack | Unauthorized connection attempt from IP address 221.126.242.254 on Port 445(SMB) | 2020-09-05 19:17:35 | 
| 222.65.250.250 | attack | $f2bV_matches | 2020-09-05 19:30:40 | 
| 195.12.137.210 | attack | Sep 5 10:32:05 ns382633 sshd\[12431\]: Invalid user oracle from 195.12.137.210 port 50804 Sep 5 10:32:05 ns382633 sshd\[12431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.12.137.210 Sep 5 10:32:07 ns382633 sshd\[12431\]: Failed password for invalid user oracle from 195.12.137.210 port 50804 ssh2 Sep 5 10:36:20 ns382633 sshd\[13179\]: Invalid user ups from 195.12.137.210 port 36682 Sep 5 10:36:20 ns382633 sshd\[13179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.12.137.210 | 2020-09-05 19:19:25 | 
| 181.118.66.173 | attack | Unauthorized connection attempt from IP address 181.118.66.173 on Port 445(SMB) | 2020-09-05 19:07:54 | 
| 129.146.113.119 | attackspam | Brute forcing email accounts | 2020-09-05 19:20:42 | 
| 119.115.29.89 | attackbots | Unauthorised access (Sep 5) SRC=119.115.29.89 LEN=40 TTL=46 ID=39170 TCP DPT=8080 WINDOW=64537 SYN Unauthorised access (Sep 4) SRC=119.115.29.89 LEN=40 TTL=46 ID=34090 TCP DPT=8080 WINDOW=64537 SYN Unauthorised access (Sep 4) SRC=119.115.29.89 LEN=40 TTL=46 ID=14013 TCP DPT=8080 WINDOW=2434 SYN Unauthorised access (Sep 3) SRC=119.115.29.89 LEN=40 TTL=46 ID=39331 TCP DPT=8080 WINDOW=64537 SYN Unauthorised access (Sep 2) SRC=119.115.29.89 LEN=40 TTL=46 ID=49473 TCP DPT=8080 WINDOW=64537 SYN Unauthorised access (Sep 2) SRC=119.115.29.89 LEN=40 TTL=45 ID=60329 TCP DPT=8080 WINDOW=2434 SYN Unauthorised access (Sep 2) SRC=119.115.29.89 LEN=40 TTL=46 ID=51918 TCP DPT=8080 WINDOW=64537 SYN | 2020-09-05 19:21:03 |