City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.125.118.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34148
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.125.118.212.			IN	A
;; AUTHORITY SECTION:
.			300	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:42:59 CST 2022
;; MSG SIZE  rcvd: 107
        212.118.125.13.in-addr.arpa domain name pointer ec2-13-125-118-212.ap-northeast-2.compute.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
212.118.125.13.in-addr.arpa	name = ec2-13-125-118-212.ap-northeast-2.compute.amazonaws.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 49.247.213.143 | attack | Jul 22 11:09:12 mail sshd\[1635\]: Failed password for invalid user kj from 49.247.213.143 port 37148 ssh2 Jul 22 11:26:25 mail sshd\[2026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.213.143 user=backup ...  | 
                    2019-07-22 18:37:43 | 
| 103.117.234.122 | attack | Automatic report - Port Scan Attack  | 
                    2019-07-22 18:02:19 | 
| 157.230.110.11 | attack | Jul 22 14:57:31 areeb-Workstation sshd\[6335\]: Invalid user ftp from 157.230.110.11 Jul 22 14:57:31 areeb-Workstation sshd\[6335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.110.11 Jul 22 14:57:33 areeb-Workstation sshd\[6335\]: Failed password for invalid user ftp from 157.230.110.11 port 34650 ssh2 ...  | 
                    2019-07-22 18:05:52 | 
| 78.187.167.64 | attack | Unauthorized connection attempt from IP address 78.187.167.64 on Port 445(SMB)  | 
                    2019-07-22 18:36:33 | 
| 80.216.236.42 | attack | port scan and connect, tcp 23 (telnet)  | 
                    2019-07-22 18:02:48 | 
| 103.111.55.230 | attackbots | @LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-22 02:48:22,373 INFO [amun_request_handler] PortScan Detected on Port: 445 (103.111.55.230)  | 
                    2019-07-22 18:26:12 | 
| 200.194.1.48 | attackbots | Honeypot attack, port: 23, PTR: PTR record not found  | 
                    2019-07-22 18:58:17 | 
| 113.173.222.210 | attackspam | Unauthorized connection attempt from IP address 113.173.222.210 on Port 445(SMB)  | 
                    2019-07-22 18:04:11 | 
| 14.251.121.253 | attack | Unauthorized connection attempt from IP address 14.251.121.253 on Port 445(SMB)  | 
                    2019-07-22 18:19:12 | 
| 36.72.170.42 | attackspambots | Unauthorized connection attempt from IP address 36.72.170.42 on Port 445(SMB)  | 
                    2019-07-22 18:47:57 | 
| 113.160.113.157 | attackbots | Unauthorized connection attempt from IP address 113.160.113.157 on Port 445(SMB)  | 
                    2019-07-22 18:44:33 | 
| 58.214.13.42 | attackbots | Jul 22 08:19:43 debian sshd\[30131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.214.13.42 user=root Jul 22 08:19:45 debian sshd\[30131\]: Failed password for root from 58.214.13.42 port 60566 ssh2 ...  | 
                    2019-07-22 18:14:27 | 
| 45.119.53.109 | attackspam | 10 attempts against mh-pma-try-ban on milky.magehost.pro  | 
                    2019-07-22 18:14:47 | 
| 40.77.167.81 | attackspam | Automatic report - Banned IP Access  | 
                    2019-07-22 18:24:42 | 
| 77.247.109.30 | attackspambots | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services  | 
                    2019-07-22 18:18:43 |