City: Orlando
Region: Florida
Country: United States
Internet Service Provider: AT&T
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.96.34.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2843
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;12.96.34.239.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 08:08:41 CST 2025
;; MSG SIZE  rcvd: 105
        Host 239.34.96.12.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 239.34.96.12.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 80.218.60.250 | attackspam | SSH/22 MH Probe, BF, Hack -  | 
                    2020-07-16 01:13:30 | 
| 40.122.209.136 | attackbotsspam | Jul 15 16:48:33 lnxmail61 sshd[20867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.122.209.136 Jul 15 16:48:33 lnxmail61 sshd[20868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.122.209.136  | 
                    2020-07-16 01:02:28 | 
| 74.56.131.113 | attackspambots | SSH bruteforce  | 
                    2020-07-16 01:05:45 | 
| 40.119.160.46 | attackbotsspam | Jul 15 13:13:03 mail sshd\[48027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.119.160.46 user=root ...  | 
                    2020-07-16 01:17:03 | 
| 182.253.250.226 | attackbotsspam | 1594818133 - 07/15/2020 15:02:13 Host: 182.253.250.226/182.253.250.226 Port: 445 TCP Blocked  | 
                    2020-07-16 01:15:24 | 
| 31.42.72.15 | attackbots | 1594826668 - 07/15/2020 17:24:28 Host: 31.42.72.15/31.42.72.15 Port: 445 TCP Blocked  | 
                    2020-07-16 00:41:39 | 
| 102.133.233.105 | attack | Jul 15 12:27:17 mail sshd\[30144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.133.233.105 user=root ...  | 
                    2020-07-16 00:56:29 | 
| 116.24.72.240 | attackbots | Automatic report - Port Scan  | 
                    2020-07-16 01:13:03 | 
| 49.233.75.31 | attack | Jul 15 18:20:15 DAAP sshd[23885]: Invalid user mukund from 49.233.75.31 port 39758 Jul 15 18:20:15 DAAP sshd[23885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.75.31 Jul 15 18:20:15 DAAP sshd[23885]: Invalid user mukund from 49.233.75.31 port 39758 Jul 15 18:20:17 DAAP sshd[23885]: Failed password for invalid user mukund from 49.233.75.31 port 39758 ssh2 Jul 15 18:24:02 DAAP sshd[23922]: Invalid user pedro from 49.233.75.31 port 45806 ...  | 
                    2020-07-16 00:49:25 | 
| 40.121.197.244 | attack | Jul 15 16:44:50 ncomp sshd[22589]: Invalid user wieisek from 40.121.197.244 Jul 15 16:44:50 ncomp sshd[22588]: Invalid user beta2 from 40.121.197.244 Jul 15 16:44:50 ncomp sshd[22590]: Invalid user beta2.wieisek.co.za from 40.121.197.244  | 
                    2020-07-16 01:07:01 | 
| 40.69.100.116 | attackbots | Jul 15 12:20:29 mail sshd\[6762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.69.100.116 user=root ...  | 
                    2020-07-16 00:46:56 | 
| 113.160.154.86 | attack | Unauthorized connection attempt from IP address 113.160.154.86 on Port 445(SMB)  | 
                    2020-07-16 00:35:51 | 
| 144.76.153.231 | attackbots | RDP brute forcing (d)  | 
                    2020-07-16 00:51:03 | 
| 40.71.199.120 | attack | Jul 15 11:54:29 mail sshd\[26358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.71.199.120 user=root ...  | 
                    2020-07-16 00:44:15 | 
| 40.118.101.7 | attackbotsspam | ssh brute force  | 
                    2020-07-16 00:38:20 |