City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.42.172.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13155
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.42.172.196.			IN	A
;; AUTHORITY SECTION:
.			445	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400
;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 12:20:39 CST 2022
;; MSG SIZE  rcvd: 107
        Host 196.172.42.121.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 196.172.42.121.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 80.211.35.16 | attack | Nov 16 21:35:05 lnxded63 sshd[312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.35.16  | 
                    2019-11-17 04:59:04 | 
| 159.65.157.194 | attackspam | Invalid user manalo from 159.65.157.194 port 47262  | 
                    2019-11-17 04:32:02 | 
| 103.94.171.218 | attack | Unauthorized connection attempt from IP address 103.94.171.218 on Port 445(SMB)  | 
                    2019-11-17 04:42:57 | 
| 128.199.216.250 | attack | F2B blocked SSH bruteforcing  | 
                    2019-11-17 04:37:22 | 
| 111.93.94.10 | attack | Invalid user krulewitch from 111.93.94.10 port 59170  | 
                    2019-11-17 04:53:35 | 
| 77.42.73.40 | attack | Automatic report - Port Scan Attack  | 
                    2019-11-17 04:33:05 | 
| 218.249.69.210 | attackspam | Invalid user surray from 218.249.69.210 port 23578  | 
                    2019-11-17 04:51:03 | 
| 116.103.140.228 | attackspambots | Unauthorized connection attempt from IP address 116.103.140.228 on Port 445(SMB)  | 
                    2019-11-17 04:50:13 | 
| 213.136.109.67 | attackspambots | Nov 16 08:41:01 web1 sshd\[27837\]: Invalid user veiculo from 213.136.109.67 Nov 16 08:41:01 web1 sshd\[27837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.136.109.67 Nov 16 08:41:03 web1 sshd\[27837\]: Failed password for invalid user veiculo from 213.136.109.67 port 45426 ssh2 Nov 16 08:45:03 web1 sshd\[28205\]: Invalid user rafek from 213.136.109.67 Nov 16 08:45:03 web1 sshd\[28205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.136.109.67  | 
                    2019-11-17 04:40:11 | 
| 200.165.167.10 | attackbotsspam | Nov 16 21:24:01 localhost sshd\[19124\]: Invalid user root123456789 from 200.165.167.10 port 51200 Nov 16 21:24:01 localhost sshd\[19124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.165.167.10 Nov 16 21:24:03 localhost sshd\[19124\]: Failed password for invalid user root123456789 from 200.165.167.10 port 51200 ssh2  | 
                    2019-11-17 04:48:05 | 
| 185.186.141.125 | attack | Automatic report - XMLRPC Attack  | 
                    2019-11-17 04:30:01 | 
| 124.118.186.230 | attackspambots | Automatic report - Port Scan Attack  | 
                    2019-11-17 05:08:13 | 
| 183.82.121.34 | attackspam | Nov 16 07:35:04 hanapaa sshd\[18023\]: Invalid user wwwrun from 183.82.121.34 Nov 16 07:35:04 hanapaa sshd\[18023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34 Nov 16 07:35:06 hanapaa sshd\[18023\]: Failed password for invalid user wwwrun from 183.82.121.34 port 59916 ssh2 Nov 16 07:39:32 hanapaa sshd\[18522\]: Invalid user hastad from 183.82.121.34 Nov 16 07:39:32 hanapaa sshd\[18522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.34  | 
                    2019-11-17 04:54:42 | 
| 213.171.45.178 | attackbots | A spam email was sent from this SMTP server. This kind of spam emails had the following features.: - They attempted to camouflage the SMTP server with a KDDI's legitimate server. - The domain of URLs in the messages was best-self.info (103.212.223.59).  | 
                    2019-11-17 04:38:48 | 
| 81.182.241.76 | attackspam | Invalid user cruickshank from 81.182.241.76 port 34422  | 
                    2019-11-17 04:27:21 |