City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.125.122.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9690
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.125.122.68.			IN	A
;; AUTHORITY SECTION:
.			127	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400
;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 11:43:01 CST 2022
;; MSG SIZE  rcvd: 106
        68.122.125.13.in-addr.arpa domain name pointer ec2-13-125-122-68.ap-northeast-2.compute.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
68.122.125.13.in-addr.arpa	name = ec2-13-125-122-68.ap-northeast-2.compute.amazonaws.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 80.82.64.127 | attackbotsspam | 01/02/2020-02:10:43.791898 80.82.64.127 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82  | 
                    2020-01-02 15:20:34 | 
| 86.108.8.63 | attack | Automatic report - Banned IP Access  | 
                    2020-01-02 15:02:46 | 
| 45.225.216.80 | attackspam | Jan 2 08:25:01 dedicated sshd[17911]: Invalid user arrow from 45.225.216.80 port 58076  | 
                    2020-01-02 15:25:11 | 
| 49.88.112.114 | attackbotsspam | Jan 2 07:46:08 localhost sshd\[15826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114 user=root Jan 2 07:46:11 localhost sshd\[15826\]: Failed password for root from 49.88.112.114 port 12111 ssh2 Jan 2 07:46:14 localhost sshd\[15826\]: Failed password for root from 49.88.112.114 port 12111 ssh2  | 
                    2020-01-02 14:56:20 | 
| 222.186.180.17 | attack | Jan 2 08:28:36 localhost sshd\[22408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17 user=root Jan 2 08:28:38 localhost sshd\[22408\]: Failed password for root from 222.186.180.17 port 43764 ssh2 Jan 2 08:28:41 localhost sshd\[22408\]: Failed password for root from 222.186.180.17 port 43764 ssh2  | 
                    2020-01-02 15:29:27 | 
| 27.188.40.253 | attackspambots | Honeypot attack, port: 23, PTR: PTR record not found  | 
                    2020-01-02 15:26:41 | 
| 148.70.231.231 | spam | Host: 148.70.231.231  | 
                    2020-01-02 15:33:12 | 
| 92.119.160.145 | attackspambots | Triggered: repeated knocking on closed ports.  | 
                    2020-01-02 15:13:27 | 
| 176.113.161.104 | attack | "SERVER-WEBAPP GPON Router authentication bypass and command injection attempt"  | 
                    2020-01-02 15:17:55 | 
| 45.95.168.106 | attackspam | firewall-block, port(s): 123/udp  | 
                    2020-01-02 15:19:19 | 
| 223.166.241.185 | attack | Port Scan  | 
                    2020-01-02 15:22:58 | 
| 112.85.42.72 | attackspam | Jan 2 06:40:47 game-panel sshd[30024]: Failed password for root from 112.85.42.72 port 19359 ssh2 Jan 2 06:48:57 game-panel sshd[30403]: Failed password for root from 112.85.42.72 port 34883 ssh2 Jan 2 06:48:59 game-panel sshd[30403]: Failed password for root from 112.85.42.72 port 34883 ssh2  | 
                    2020-01-02 15:24:02 | 
| 198.211.116.95 | attackspambots | 2020-01-02T06:50:30.974013homeassistant sshd[29436]: Invalid user mullane from 198.211.116.95 port 42294 2020-01-02T06:50:30.980583homeassistant sshd[29436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.116.95 ...  | 
                    2020-01-02 15:00:21 | 
| 222.186.173.215 | attack | Jan 2 07:01:34 sw3 sshd[13074]: Failed password for root from 222.186.173.215 port 1648 ssh2 Jan 2 07:01:37 sw3 sshd[13074]: Failed password for root from 222.186.173.215 port 1648 ssh2 Jan 2 07:01:41 sw3 sshd[13074]: Failed password for root from 222.186.173.215 port 1648 ssh2  | 
                    2020-01-02 15:06:12 | 
| 92.63.194.90 | attackspambots | Jan 2 07:30:40 localhost sshd\[14077\]: Invalid user admin from 92.63.194.90 port 36044 Jan 2 07:30:40 localhost sshd\[14077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.90 Jan 2 07:30:42 localhost sshd\[14077\]: Failed password for invalid user admin from 92.63.194.90 port 36044 ssh2  | 
                    2020-01-02 14:55:00 |