City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.248.194.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.248.194.103.			IN	A
;; AUTHORITY SECTION:
.			99	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:18:55 CST 2022
;; MSG SIZE  rcvd: 107
        103.194.248.13.in-addr.arpa domain name pointer a4c19a2baeaeb2efc.awsglobalaccelerator.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
103.194.248.13.in-addr.arpa	name = a4c19a2baeaeb2efc.awsglobalaccelerator.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 78.97.238.231 | attackbotsspam | 2019-07-11T01:05:24.675068cavecanem sshd[3385]: Invalid user samba from 78.97.238.231 port 50762 2019-07-11T01:05:24.677674cavecanem sshd[3385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.97.238.231 2019-07-11T01:05:24.675068cavecanem sshd[3385]: Invalid user samba from 78.97.238.231 port 50762 2019-07-11T01:05:25.803792cavecanem sshd[3385]: Failed password for invalid user samba from 78.97.238.231 port 50762 ssh2 2019-07-11T01:07:55.986060cavecanem sshd[4187]: Invalid user stan from 78.97.238.231 port 47294 2019-07-11T01:07:55.988576cavecanem sshd[4187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.97.238.231 2019-07-11T01:07:55.986060cavecanem sshd[4187]: Invalid user stan from 78.97.238.231 port 47294 2019-07-11T01:07:57.845271cavecanem sshd[4187]: Failed password for invalid user stan from 78.97.238.231 port 47294 ssh2 2019-07-11T01:09:43.732152cavecanem sshd[4788]: Invalid user alex from ...  | 
                    2019-07-11 07:46:05 | 
| 188.38.219.54 | attackspambots | Unauthorized connection attempt from IP address 188.38.219.54 on Port 445(SMB)  | 
                    2019-07-11 07:42:28 | 
| 185.176.27.42 | attack | 10.07.2019 23:06:28 Connection to port 4100 blocked by firewall  | 
                    2019-07-11 08:04:08 | 
| 116.236.147.38 | attackbots | Jul 10 21:03:17 www sshd\[10566\]: Invalid user noah from 116.236.147.38 port 43570 ...  | 
                    2019-07-11 08:17:58 | 
| 134.175.204.14 | attackbotsspam | Invalid user xu from 134.175.204.14 port 40340  | 
                    2019-07-11 07:43:16 | 
| 190.186.170.83 | attackspam | [ssh] SSH attack  | 
                    2019-07-11 08:11:03 | 
| 95.66.148.205 | attack | Unauthorized connection attempt from IP address 95.66.148.205 on Port 445(SMB)  | 
                    2019-07-11 08:26:08 | 
| 51.68.138.143 | attackbots | Fail2Ban Ban Triggered  | 
                    2019-07-11 07:49:30 | 
| 31.220.0.225 | attack | Honeypot hit.  | 
                    2019-07-11 08:06:51 | 
| 51.75.31.33 | attack | Jul 11 02:00:58 itv-usvr-02 sshd[5526]: Invalid user angela from 51.75.31.33 port 41132 Jul 11 02:00:58 itv-usvr-02 sshd[5526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.31.33 Jul 11 02:00:58 itv-usvr-02 sshd[5526]: Invalid user angela from 51.75.31.33 port 41132 Jul 11 02:01:00 itv-usvr-02 sshd[5526]: Failed password for invalid user angela from 51.75.31.33 port 41132 ssh2 Jul 11 02:03:45 itv-usvr-02 sshd[5681]: Invalid user user from 51.75.31.33 port 46042  | 
                    2019-07-11 07:55:13 | 
| 133.242.79.30 | attack | Invalid user james from 133.242.79.30 port 40169 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.242.79.30 Failed password for invalid user james from 133.242.79.30 port 40169 ssh2 Invalid user ls from 133.242.79.30 port 57428 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.242.79.30  | 
                    2019-07-11 07:47:10 | 
| 142.93.174.47 | attackbots | Jul 10 21:01:08 MainVPS sshd[23442]: Invalid user jeferson from 142.93.174.47 port 45166 Jul 10 21:01:08 MainVPS sshd[23442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.174.47 Jul 10 21:01:08 MainVPS sshd[23442]: Invalid user jeferson from 142.93.174.47 port 45166 Jul 10 21:01:11 MainVPS sshd[23442]: Failed password for invalid user jeferson from 142.93.174.47 port 45166 ssh2 Jul 10 21:03:58 MainVPS sshd[23666]: Invalid user friedrich from 142.93.174.47 port 50526 ...  | 
                    2019-07-11 07:45:10 | 
| 147.75.123.190 | attackspambots | Unauthorized connection attempt from IP address 147.75.123.190 on Port 445(SMB)  | 
                    2019-07-11 08:03:36 | 
| 183.134.78.215 | attack | Jul 10 19:00:21 localhost sshd\[110079\]: Invalid user dana from 183.134.78.215 port 32870 Jul 10 19:00:21 localhost sshd\[110079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.78.215 Jul 10 19:00:23 localhost sshd\[110079\]: Failed password for invalid user dana from 183.134.78.215 port 32870 ssh2 Jul 10 19:03:41 localhost sshd\[110234\]: Invalid user admin from 183.134.78.215 port 36280 Jul 10 19:03:41 localhost sshd\[110234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.78.215 ...  | 
                    2019-07-11 07:58:05 | 
| 70.45.243.146 | attackbotsspam | Jul 11 02:01:24 vpn01 sshd\[27950\]: Invalid user yin from 70.45.243.146 Jul 11 02:01:24 vpn01 sshd\[27950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.45.243.146 Jul 11 02:01:27 vpn01 sshd\[27950\]: Failed password for invalid user yin from 70.45.243.146 port 49256 ssh2  | 
                    2019-07-11 08:04:37 |