City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.48.203.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48308
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.48.203.148.			IN	A
;; AUTHORITY SECTION:
.			59	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:05:49 CST 2022
;; MSG SIZE  rcvd: 106
        148.203.48.13.in-addr.arpa domain name pointer ec2-13-48-203-148.eu-north-1.compute.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
148.203.48.13.in-addr.arpa	name = ec2-13-48-203-148.eu-north-1.compute.amazonaws.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 124.30.44.214 | attackbots | SSH Brute-Force reported by Fail2Ban  | 
                    2020-09-22 20:57:03 | 
| 164.132.46.197 | attackbots | Sep 22 04:35:13 web8 sshd\[3866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.197 user=root Sep 22 04:35:14 web8 sshd\[3866\]: Failed password for root from 164.132.46.197 port 35634 ssh2 Sep 22 04:37:49 web8 sshd\[5192\]: Invalid user jeus from 164.132.46.197 Sep 22 04:37:49 web8 sshd\[5192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.197 Sep 22 04:37:51 web8 sshd\[5192\]: Failed password for invalid user jeus from 164.132.46.197 port 43694 ssh2  | 
                    2020-09-22 20:50:51 | 
| 119.236.160.25 | attackbotsspam | Sep 21 17:01:40 ssh2 sshd[36042]: User root from n119236160025.netvigator.com not allowed because not listed in AllowUsers Sep 21 17:01:40 ssh2 sshd[36042]: Failed password for invalid user root from 119.236.160.25 port 52207 ssh2 Sep 21 17:01:41 ssh2 sshd[36042]: Connection closed by invalid user root 119.236.160.25 port 52207 [preauth] ...  | 
                    2020-09-22 20:42:21 | 
| 180.124.76.196 | attack | Automatic report - Port Scan Attack  | 
                    2020-09-22 20:54:24 | 
| 5.189.180.230 | attackbots | Invalid user www from 5.189.180.230 port 33528  | 
                    2020-09-22 21:09:42 | 
| 160.124.103.55 | attackspam | Banned for a week because repeated abuses, for example SSH, but not only  | 
                    2020-09-22 21:19:34 | 
| 94.21.93.44 | attackspambots | 94.21.93.44 (HU/Hungary/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 22 08:46:26 jbs1 sshd[6737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.169.214.217 user=root Sep 22 08:44:30 jbs1 sshd[4582]: Failed password for root from 94.21.93.44 port 54473 ssh2 Sep 22 08:44:17 jbs1 sshd[4391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.145.189 user=root Sep 22 08:44:19 jbs1 sshd[4391]: Failed password for root from 120.71.145.189 port 59136 ssh2 Sep 22 08:46:29 jbs1 sshd[6737]: Failed password for root from 95.169.214.217 port 55436 ssh2 Sep 22 08:47:47 jbs1 sshd[8178]: Failed password for root from 193.107.91.24 port 53904 ssh2 IP Addresses Blocked: 95.169.214.217 (BG/Bulgaria/-)  | 
                    2020-09-22 21:00:42 | 
| 45.14.150.51 | attack | Sep 22 12:51:43 ip106 sshd[9293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.150.51 Sep 22 12:51:46 ip106 sshd[9293]: Failed password for invalid user gb from 45.14.150.51 port 39746 ssh2 ...  | 
                    2020-09-22 21:04:53 | 
| 154.8.151.45 | attackbotsspam | Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-22T12:24:34Z and 2020-09-22T12:37:09Z  | 
                    2020-09-22 21:15:27 | 
| 60.167.176.184 | attackspambots | $f2bV_matches  | 
                    2020-09-22 21:15:41 | 
| 218.54.251.99 | attackbots | Brute-force attempt banned  | 
                    2020-09-22 21:16:42 | 
| 190.25.49.114 | attackspam | Sep 21 19:04:05 vm1 sshd[10551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.25.49.114 Sep 21 19:04:07 vm1 sshd[10551]: Failed password for invalid user postgres from 190.25.49.114 port 5006 ssh2 ...  | 
                    2020-09-22 21:05:07 | 
| 51.68.123.198 | attackbotsspam | Invalid user tecnici from 51.68.123.198 port 60242  | 
                    2020-09-22 21:07:49 | 
| 80.82.65.187 | attack | [H1.VM10] Blocked by UFW  | 
                    2020-09-22 20:52:02 | 
| 106.54.166.168 | attackbots | Invalid user admin from 106.54.166.168 port 47432  | 
                    2020-09-22 20:43:49 |