City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.114.83.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54864
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.114.83.148.			IN	A
;; AUTHORITY SECTION:
.			135	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 04:52:46 CST 2022
;; MSG SIZE  rcvd: 106148.83.114.13.in-addr.arpa domain name pointer ec2-13-114-83-148.ap-northeast-1.compute.amazonaws.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
148.83.114.13.in-addr.arpa	name = ec2-13-114-83-148.ap-northeast-1.compute.amazonaws.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 175.176.38.150 | attackbotsspam | Email rejected due to spam filtering | 2020-08-02 03:15:21 | 
| 104.42.124.11 | attack | Automatic report - Banned IP Access | 2020-08-02 02:51:03 | 
| 179.251.182.24 | attack | Automatic report - Port Scan Attack | 2020-08-02 02:39:59 | 
| 196.206.254.240 | attackspambots | SSH brutforce | 2020-08-02 02:45:20 | 
| 39.33.176.75 | attackbotsspam | Email rejected due to spam filtering | 2020-08-02 03:00:15 | 
| 109.95.35.106 | attackspambots | Email rejected due to spam filtering | 2020-08-02 02:59:16 | 
| 1.55.0.244 | attackspambots | Email rejected due to spam filtering | 2020-08-02 02:42:23 | 
| 167.71.9.180 | attack | 2020-08-01T14:19:44.6473701495-001 sshd[49570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.9.180 user=root 2020-08-01T14:19:46.2488871495-001 sshd[49570]: Failed password for root from 167.71.9.180 port 44668 ssh2 2020-08-01T14:23:25.9074751495-001 sshd[49731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.9.180 user=root 2020-08-01T14:23:28.1816621495-001 sshd[49731]: Failed password for root from 167.71.9.180 port 55144 ssh2 2020-08-01T14:26:59.1666761495-001 sshd[49823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.9.180 user=root 2020-08-01T14:27:00.8182751495-001 sshd[49823]: Failed password for root from 167.71.9.180 port 37428 ssh2 ... | 2020-08-02 03:13:16 | 
| 41.199.128.147 | attackbotsspam | Email rejected due to spam filtering | 2020-08-02 03:14:58 | 
| 42.114.228.51 | attackspambots | Telnet/23 MH Probe, Scan, BF, Hack - | 2020-08-02 02:43:12 | 
| 106.52.212.117 | attackspam | [ssh] SSH attack | 2020-08-02 03:08:30 | 
| 106.13.78.166 | attack | Jul 31 08:55:33 *** sshd[25427]: Failed password for r.r from 106.13.78.166 port 59306 ssh2 Jul 31 08:58:33 *** sshd[25444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.78.166 user=r.r Jul 31 08:58:34 *** sshd[25444]: Failed password for r.r from 106.13.78.166 port 36612 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=106.13.78.166 | 2020-08-02 02:37:32 | 
| 51.178.50.20 | attackbots | prod6 ... | 2020-08-02 03:06:18 | 
| 159.89.115.126 | attack | "Unauthorized connection attempt on SSHD detected" | 2020-08-02 02:41:06 | 
| 105.58.227.30 | attackspam | Email rejected due to spam filtering | 2020-08-02 02:42:56 |