City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.111.5.32
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35842
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.111.5.32.			IN	A
;; AUTHORITY SECTION:
.			167	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:41:22 CST 2022
;; MSG SIZE  rcvd: 10432.5.111.13.in-addr.arpa domain name pointer mta.email.ab-inbev.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
32.5.111.13.in-addr.arpa	name = mta.email.ab-inbev.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 196.52.43.92 | attackspam | Unauthorized connection attempt detected from IP address 196.52.43.92 to port 5901 | 2019-12-29 08:06:51 | 
| 185.175.93.14 | attackspam | Dec 29 00:15:11 debian-2gb-nbg1-2 kernel: \[1227626.730685\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.14 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=57619 PROTO=TCP SPT=54810 DPT=4000 WINDOW=1024 RES=0x00 SYN URGP=0 | 2019-12-29 07:43:44 | 
| 200.207.222.98 | attackspam | Unauthorized connection attempt detected from IP address 200.207.222.98 to port 88 | 2019-12-29 08:03:44 | 
| 121.148.208.201 | attackbots | Unauthorized connection attempt detected from IP address 121.148.208.201 to port 85 | 2019-12-29 08:16:15 | 
| 189.191.240.106 | attack | Unauthorized connection attempt detected from IP address 189.191.240.106 to port 8000 | 2019-12-29 08:09:52 | 
| 195.205.161.60 | attack | Unauthorized connection attempt detected from IP address 195.205.161.60 to port 8080 | 2019-12-29 08:07:19 | 
| 116.55.248.214 | attackspam | Triggered by Fail2Ban at Vostok web server | 2019-12-29 07:58:08 | 
| 222.186.180.6 | attackbots | Dec 28 18:42:08 linuxvps sshd\[36634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6 user=root Dec 28 18:42:10 linuxvps sshd\[36634\]: Failed password for root from 222.186.180.6 port 4178 ssh2 Dec 28 18:42:32 linuxvps sshd\[36864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6 user=root Dec 28 18:42:34 linuxvps sshd\[36864\]: Failed password for root from 222.186.180.6 port 50654 ssh2 Dec 28 18:42:53 linuxvps sshd\[37094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6 user=root | 2019-12-29 07:47:41 | 
| 210.91.150.99 | attackspambots | Unauthorized connection attempt detected from IP address 210.91.150.99 to port 4567 | 2019-12-29 08:02:45 | 
| 200.81.163.204 | attackspam | Unauthorized connection attempt detected from IP address 200.81.163.204 to port 5358 | 2019-12-29 08:04:33 | 
| 187.74.153.203 | attackbots | Unauthorized connection attempt detected from IP address 187.74.153.203 to port 80 | 2019-12-29 08:11:35 | 
| 196.52.43.127 | attack | Unauthorized connection attempt detected from IP address 196.52.43.127 to port 9983 | 2019-12-29 08:04:48 | 
| 85.10.199.217 | attack | sexual spam emails | 2019-12-29 07:45:47 | 
| 190.177.136.186 | attackbotsspam | Unauthorized connection attempt detected from IP address 190.177.136.186 to port 23 | 2019-12-29 08:07:44 | 
| 212.85.240.79 | attack | Unauthorized connection attempt detected from IP address 212.85.240.79 to port 4567 | 2019-12-29 08:02:29 |