City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.125.104.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58789
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.125.104.164.			IN	A
;; AUTHORITY SECTION:
.			131	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:42:58 CST 2022
;; MSG SIZE  rcvd: 107
        164.104.125.13.in-addr.arpa domain name pointer ec2-13-125-104-164.ap-northeast-2.compute.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
164.104.125.13.in-addr.arpa	name = ec2-13-125-104-164.ap-northeast-2.compute.amazonaws.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 177.55.62.187 | attackbotsspam | Unauthorized connection attempt from IP address 177.55.62.187 on Port 445(SMB)  | 
                    2020-09-04 17:49:21 | 
| 189.234.67.203 | attack | 20/9/3@12:44:55: FAIL: Alarm-Network address from=189.234.67.203 20/9/3@12:44:55: FAIL: Alarm-Network address from=189.234.67.203 20/9/3@12:44:55: FAIL: Alarm-Network address from=189.234.67.203 20/9/3@12:44:55: FAIL: Alarm-Network address from=189.234.67.203 ...  | 
                    2020-09-04 18:08:50 | 
| 162.243.130.35 | attack | firewall-block, port(s): 3011/tcp  | 
                    2020-09-04 17:41:17 | 
| 46.31.221.116 | attackspam | Invalid user scj from 46.31.221.116 port 56500  | 
                    2020-09-04 17:42:46 | 
| 207.154.215.3 | attackspam | Invalid user test from 207.154.215.3 port 40798  | 
                    2020-09-04 17:35:37 | 
| 185.127.24.64 | attack | Sep 4 03:50:32 server postfix/smtps/smtpd[26409]: warning: unknown[185.127.24.64]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 4 06:16:04 server postfix/smtps/smtpd[4581]: warning: unknown[185.127.24.64]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Sep 4 07:47:56 server postfix/smtps/smtpd[11322]: warning: unknown[185.127.24.64]: SASL LOGIN authentication failed: UGFzc3dvcmQ6  | 
                    2020-09-04 18:02:50 | 
| 36.81.255.151 | attack | Honeypot attack, port: 445, PTR: PTR record not found  | 
                    2020-09-04 17:43:23 | 
| 193.193.71.178 | attackspam | Dovecot Invalid User Login Attempt.  | 
                    2020-09-04 18:13:19 | 
| 171.113.39.27 | attack | Unauthorised access (Sep 3) SRC=171.113.39.27 LEN=40 TTL=53 ID=35200 TCP DPT=23 WINDOW=7342 SYN  | 
                    2020-09-04 17:59:04 | 
| 93.144.212.99 | attack | Invalid user pi from 93.144.212.99 port 39692  | 
                    2020-09-04 17:50:45 | 
| 174.108.238.163 | attackbots | Icarus honeypot on github  | 
                    2020-09-04 17:44:10 | 
| 177.66.167.18 | attackbots | Unauthorized connection attempt from IP address 177.66.167.18 on Port 445(SMB)  | 
                    2020-09-04 17:57:34 | 
| 103.57.150.168 | attackspambots | Attempted connection to port 445.  | 
                    2020-09-04 17:35:14 | 
| 177.220.217.94 | attackspam | 
  | 
                    2020-09-04 17:36:35 | 
| 173.214.162.250 | attack | Sep 3 23:51:58 php1 sshd\[4329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.214.162.250 user=root Sep 3 23:51:59 php1 sshd\[4329\]: Failed password for root from 173.214.162.250 port 54092 ssh2 Sep 3 23:53:04 php1 sshd\[4415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.214.162.250 user=root Sep 3 23:53:06 php1 sshd\[4415\]: Failed password for root from 173.214.162.250 port 34588 ssh2 Sep 3 23:54:10 php1 sshd\[4498\]: Invalid user martina from 173.214.162.250  | 
                    2020-09-04 18:01:48 |