City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.38.52.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.38.52.124.			IN	A
;; AUTHORITY SECTION:
.			461	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:05:46 CST 2022
;; MSG SIZE  rcvd: 105
        124.52.38.13.in-addr.arpa domain name pointer ec2-13-38-52-124.eu-west-3.compute.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
124.52.38.13.in-addr.arpa	name = ec2-13-38-52-124.eu-west-3.compute.amazonaws.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 222.82.250.4 | attack | " "  | 
                    2019-12-21 22:25:23 | 
| 114.67.70.255 | attack | Honeypot attack, port: 445, PTR: PTR record not found  | 
                    2019-12-21 22:26:14 | 
| 162.243.59.16 | attack | 2019-12-21T14:35:50.412552 sshd[13393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.59.16 user=root 2019-12-21T14:35:53.003382 sshd[13393]: Failed password for root from 162.243.59.16 port 53522 ssh2 2019-12-21T14:41:13.849892 sshd[13504]: Invalid user server from 162.243.59.16 port 58446 2019-12-21T14:41:13.864785 sshd[13504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.59.16 2019-12-21T14:41:13.849892 sshd[13504]: Invalid user server from 162.243.59.16 port 58446 2019-12-21T14:41:15.466582 sshd[13504]: Failed password for invalid user server from 162.243.59.16 port 58446 ssh2 ...  | 
                    2019-12-21 22:08:39 | 
| 1.58.113.147 | attackbots | FTP Brute Force  | 
                    2019-12-21 22:48:05 | 
| 91.121.2.33 | attack | Invalid user smmsp from 91.121.2.33 port 32768  | 
                    2019-12-21 22:48:20 | 
| 220.117.199.243 | attackbotsspam | Automatic report - Banned IP Access  | 
                    2019-12-21 22:50:50 | 
| 112.247.91.225 | attackbotsspam | Honeypot attack, port: 23, PTR: PTR record not found  | 
                    2019-12-21 22:18:58 | 
| 119.94.11.78 | attackspam | Honeypot attack, port: 445, PTR: 119.94.11.78.static.pldt.net.  | 
                    2019-12-21 22:14:55 | 
| 110.4.189.228 | attackspam | Dec 21 14:36:45 nextcloud sshd\[27553\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.4.189.228 user=root Dec 21 14:36:47 nextcloud sshd\[27553\]: Failed password for root from 110.4.189.228 port 37386 ssh2 Dec 21 14:47:31 nextcloud sshd\[12104\]: Invalid user guest from 110.4.189.228 Dec 21 14:47:31 nextcloud sshd\[12104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.4.189.228 ...  | 
                    2019-12-21 22:32:01 | 
| 1.29.148.140 | attackbotsspam | Scanning  | 
                    2019-12-21 22:32:34 | 
| 119.207.227.167 | attackbotsspam | Honeypot attack, port: 81, PTR: PTR record not found  | 
                    2019-12-21 22:29:09 | 
| 94.73.203.169 | attack | Honeypot attack, port: 81, PTR: 169.203.73.94.ip.orionnet.ru.  | 
                    2019-12-21 22:40:59 | 
| 185.56.153.231 | attack | Invalid user patrick from 185.56.153.231 port 57486  | 
                    2019-12-21 22:10:46 | 
| 83.246.167.5 | attack | Honeypot attack, port: 445, PTR: ip-83-246-167-05.intelbi.ru.  | 
                    2019-12-21 22:12:22 | 
| 111.229.34.241 | attackspambots | Invalid user rpm from 111.229.34.241 port 56214  | 
                    2019-12-21 22:09:02 |