City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.124.66.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15464
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.124.66.18.			IN	A
;; AUTHORITY SECTION:
.			142	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:42:47 CST 2022
;; MSG SIZE  rcvd: 105
        18.66.124.13.in-addr.arpa domain name pointer ec2-13-124-66-18.ap-northeast-2.compute.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
18.66.124.13.in-addr.arpa	name = ec2-13-124-66-18.ap-northeast-2.compute.amazonaws.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 187.189.11.49 | attack | *Port Scan* detected from 187.189.11.49 (MX/Mexico/fixed-187-189-11-49.totalplay.net). 4 hits in the last 30 seconds  | 
                    2020-02-15 05:29:16 | 
| 125.16.82.66 | attack | 1581687925 - 02/14/2020 14:45:25 Host: 125.16.82.66/125.16.82.66 Port: 445 TCP Blocked  | 
                    2020-02-15 05:10:34 | 
| 188.165.55.121 | attackbotsspam | trying to access non-authorized port  | 
                    2020-02-15 05:23:48 | 
| 213.194.74.226 | attackspambots | Unauthorized connection attempt from IP address 213.194.74.226 on Port 445(SMB)  | 
                    2020-02-15 05:27:48 | 
| 49.233.22.115 | attack | Port scan detected on ports: 2375[TCP], 2377[TCP], 4244[TCP]  | 
                    2020-02-15 05:18:52 | 
| 183.80.222.65 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack -  | 
                    2020-02-15 05:01:23 | 
| 1.175.254.184 | attack | 20/2/14@08:45:36: FAIL: Alarm-Telnet address from=1.175.254.184 ...  | 
                    2020-02-15 04:58:36 | 
| 46.77.93.54 | attack | Port probing on unauthorized port 23  | 
                    2020-02-15 05:27:04 | 
| 183.80.222.54 | attack | MultiHost/MultiPort Probe, Scan, Hack -  | 
                    2020-02-15 05:12:34 | 
| 140.143.59.171 | attackspam | SSH Login Bruteforce  | 
                    2020-02-15 05:00:00 | 
| 60.188.207.89 | attack | Feb 14 14:45:24 debian-2gb-nbg1-2 kernel: \[3947149.828789\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=60.188.207.89 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=39584 PROTO=TCP SPT=44839 DPT=23 WINDOW=33295 RES=0x00 SYN URGP=0  | 
                    2020-02-15 05:11:35 | 
| 80.240.137.15 | attackspam | Feb 14 21:01:00 cp sshd[31601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.240.137.15  | 
                    2020-02-15 05:18:22 | 
| 79.19.103.229 | attack | Automatic report - Port Scan Attack  | 
                    2020-02-15 05:25:12 | 
| 185.53.88.26 | attack | [2020-02-14 15:30:21] NOTICE[1148][C-00009259] chan_sip.c: Call from '' (185.53.88.26:63817) to extension '9011441613940821' rejected because extension not found in context 'public'. [2020-02-14 15:30:21] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-02-14T15:30:21.709-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441613940821",SessionID="0x7fd82c80d368",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.26/63817",ACLName="no_extension_match" [2020-02-14 15:30:25] NOTICE[1148][C-0000925a] chan_sip.c: Call from '' (185.53.88.26:64617) to extension '011441613940821' rejected because extension not found in context 'public'. ...  | 
                    2020-02-15 04:50:38 | 
| 50.226.108.234 | attackbotsspam | 21 attempts against mh-ssh on cloud  | 
                    2020-02-15 05:09:26 |