City: unknown
Region: unknown
Country: None
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.31.11.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;123.31.11.119.			IN	A
;; AUTHORITY SECTION:
.			171	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:37:10 CST 2022
;; MSG SIZE  rcvd: 106
        119.11.31.123.in-addr.arpa domain name pointer static.vnpt.vn.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
119.11.31.123.in-addr.arpa	name = static.vnpt.vn.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 14.231.122.67 | attackspam | Aug 18 14:31:15 www postfix/smtpd\[11341\]: lost connection after CONNECT from unknown\[14.231.122.67\]  | 
                    2020-08-19 01:49:01 | 
| 178.209.111.193 | attackbotsspam | Unauthorized connection attempt from IP address 178.209.111.193 on Port 445(SMB)  | 
                    2020-08-19 02:02:53 | 
| 120.79.136.8 | attackbotsspam | 16 attempts to connect with user admin  | 
                    2020-08-19 02:06:01 | 
| 193.112.4.12 | attackbots | Aug 18 19:44:46 cosmoit sshd[25473]: Failed password for root from 193.112.4.12 port 49944 ssh2  | 
                    2020-08-19 01:46:03 | 
| 115.73.116.135 | attackbots | Unauthorized connection attempt from IP address 115.73.116.135 on Port 445(SMB)  | 
                    2020-08-19 02:09:50 | 
| 122.176.84.178 | attackspam | Unauthorized connection attempt from IP address 122.176.84.178 on Port 445(SMB)  | 
                    2020-08-19 01:38:48 | 
| 62.113.87.30 | attackspambots | Unauthorized connection attempt from IP address 62.113.87.30 on Port 445(SMB)  | 
                    2020-08-19 02:00:57 | 
| 108.169.142.10 | attackspam | Unauthorized connection attempt from IP address 108.169.142.10 on Port 445(SMB)  | 
                    2020-08-19 02:07:04 | 
| 112.85.42.185 | attackspam | Aug 18 19:37:19 PorscheCustomer sshd[29699]: Failed password for root from 112.85.42.185 port 34061 ssh2 Aug 18 19:37:21 PorscheCustomer sshd[29699]: Failed password for root from 112.85.42.185 port 34061 ssh2 Aug 18 19:37:24 PorscheCustomer sshd[29699]: Failed password for root from 112.85.42.185 port 34061 ssh2 ...  | 
                    2020-08-19 01:44:29 | 
| 92.59.136.208 | attackspam | Unauthorized connection attempt from IP address 92.59.136.208 on Port 445(SMB)  | 
                    2020-08-19 02:13:51 | 
| 130.25.125.174 | attackspambots | Automatic report - Banned IP Access  | 
                    2020-08-19 01:50:02 | 
| 106.12.194.204 | attackbots | Aug 18 10:26:26 dignus sshd[32486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.194.204 Aug 18 10:26:28 dignus sshd[32486]: Failed password for invalid user minecraft from 106.12.194.204 port 60740 ssh2 Aug 18 10:29:47 dignus sshd[474]: Invalid user gituser from 106.12.194.204 port 44042 Aug 18 10:29:47 dignus sshd[474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.194.204 Aug 18 10:29:49 dignus sshd[474]: Failed password for invalid user gituser from 106.12.194.204 port 44042 ssh2 ...  | 
                    2020-08-19 01:44:57 | 
| 116.110.49.148 | attackbotsspam | Unauthorized connection attempt from IP address 116.110.49.148 on Port 445(SMB)  | 
                    2020-08-19 01:35:13 | 
| 106.13.93.199 | attackspambots | Aug 18 19:30:58 webhost01 sshd[25368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.93.199 Aug 18 19:31:00 webhost01 sshd[25368]: Failed password for invalid user erp from 106.13.93.199 port 53620 ssh2 ...  | 
                    2020-08-19 02:10:17 | 
| 161.35.11.118 | attackbots | Aug 18 16:50:16 PorscheCustomer sshd[26208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.11.118 Aug 18 16:50:18 PorscheCustomer sshd[26208]: Failed password for invalid user allan from 161.35.11.118 port 54510 ssh2 Aug 18 16:55:23 PorscheCustomer sshd[26344]: Failed password for root from 161.35.11.118 port 36134 ssh2 ...  | 
                    2020-08-19 01:52:31 |