City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.234.19.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5406
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.234.19.242.			IN	A
;; AUTHORITY SECTION:
.			210	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:05:45 CST 2022
;; MSG SIZE  rcvd: 106
        242.19.234.13.in-addr.arpa domain name pointer ec2-13-234-19-242.ap-south-1.compute.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
242.19.234.13.in-addr.arpa	name = ec2-13-234-19-242.ap-south-1.compute.amazonaws.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 89.248.174.193 | attackbotsspam | NL_IPV_<177>1579152740 [1:2403476:54618] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 89 [Classification: Misc Attack] [Priority: 2] {TCP} 89.248.174.193:54458 | 
                    2020-01-16 13:43:02 | 
| 193.106.248.143 | attackspambots | Automatic report - XMLRPC Attack  | 
                    2020-01-16 14:06:54 | 
| 181.48.116.50 | attack | $f2bV_matches  | 
                    2020-01-16 13:54:38 | 
| 106.75.244.62 | attack | Jan 16 06:24:51 vps691689 sshd[25255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.244.62 Jan 16 06:24:53 vps691689 sshd[25255]: Failed password for invalid user linuxacademy from 106.75.244.62 port 34808 ssh2 ...  | 
                    2020-01-16 13:58:55 | 
| 202.80.214.80 | attack | Invalid user admin from 202.80.214.80 port 27187  | 
                    2020-01-16 14:14:28 | 
| 218.92.0.148 | attack | v+ssh-bruteforce  | 
                    2020-01-16 14:05:25 | 
| 129.28.31.102 | attack | Jan 16 01:54:47 firewall sshd[25682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.31.102 Jan 16 01:54:47 firewall sshd[25682]: Invalid user git from 129.28.31.102 Jan 16 01:54:50 firewall sshd[25682]: Failed password for invalid user git from 129.28.31.102 port 45396 ssh2 ...  | 
                    2020-01-16 13:50:23 | 
| 149.56.46.220 | attackbotsspam | Unauthorized connection attempt detected from IP address 149.56.46.220 to port 2220 [J]  | 
                    2020-01-16 13:49:47 | 
| 45.55.177.230 | attackspam | Unauthorized connection attempt detected from IP address 45.55.177.230 to port 2220 [J]  | 
                    2020-01-16 14:06:09 | 
| 172.217.8.4 | attackbotsspam | Listens in on calls. Reads text messages. Clones all devices in house. Hacks all emails and social media?accounts. Amazon account wiped out CHARGED $800 ON AMAZON. Gmail hacker. AOL hacker. Call forwarding. Records calls. Save a all pictures. Steals all files. Stalking.  | 
                    2020-01-16 13:46:28 | 
| 61.180.64.151 | attack | Jan 16 05:53:49 lnxmail61 postfix/smtpd[13438]: warning: unknown[61.180.64.151]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 16 05:53:49 lnxmail61 postfix/smtpd[13438]: lost connection after AUTH from unknown[61.180.64.151] Jan 16 05:53:56 lnxmail61 postfix/smtpd[13438]: warning: unknown[61.180.64.151]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 16 05:53:56 lnxmail61 postfix/smtpd[13438]: lost connection after AUTH from unknown[61.180.64.151] Jan 16 05:54:07 lnxmail61 postfix/smtpd[13438]: warning: unknown[61.180.64.151]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 16 05:54:07 lnxmail61 postfix/smtpd[13438]: lost connection after AUTH from unknown[61.180.64.151]  | 
                    2020-01-16 14:15:29 | 
| 202.51.111.225 | attackbots | Jan 16 05:47:21 vps sshd[17423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.111.225 Jan 16 05:47:23 vps sshd[17423]: Failed password for invalid user hijab from 202.51.111.225 port 35002 ssh2 Jan 16 05:54:36 vps sshd[17840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.111.225 ...  | 
                    2020-01-16 13:55:44 | 
| 222.186.30.187 | attackspam | Unauthorized connection attempt detected from IP address 222.186.30.187 to port 22 [J]  | 
                    2020-01-16 13:56:58 | 
| 194.8.131.47 | attackbotsspam | Jan 16 07:21:40 pkdns2 sshd\[19933\]: Invalid user nd from 194.8.131.47Jan 16 07:21:42 pkdns2 sshd\[19933\]: Failed password for invalid user nd from 194.8.131.47 port 56936 ssh2Jan 16 07:24:52 pkdns2 sshd\[20021\]: Invalid user miura from 194.8.131.47Jan 16 07:24:53 pkdns2 sshd\[20021\]: Failed password for invalid user miura from 194.8.131.47 port 35137 ssh2Jan 16 07:27:59 pkdns2 sshd\[20151\]: Invalid user jenny from 194.8.131.47Jan 16 07:28:02 pkdns2 sshd\[20151\]: Failed password for invalid user jenny from 194.8.131.47 port 40254 ssh2 ...  | 
                    2020-01-16 13:44:36 | 
| 213.230.96.243 | attackspambots | 01/16/2020-05:54:49.478507 213.230.96.243 Protocol: 6 ET POLICY Cleartext WordPress Login  | 
                    2020-01-16 13:51:14 |