City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.48.46.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21205
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.48.46.204.			IN	A
;; AUTHORITY SECTION:
.			553	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:05:49 CST 2022
;; MSG SIZE  rcvd: 105
        204.46.48.13.in-addr.arpa domain name pointer ec2-13-48-46-204.eu-north-1.compute.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
204.46.48.13.in-addr.arpa	name = ec2-13-48-46-204.eu-north-1.compute.amazonaws.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 121.28.133.226 | attackspambots | CN_APNIC-HM_<177>1583832155 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2]:  | 
                    2020-03-10 22:05:54 | 
| 41.145.250.101 | attackbotsspam | Email rejected due to spam filtering  | 
                    2020-03-10 21:35:04 | 
| 186.107.249.161 | attackbotsspam | Automatic report - Port Scan Attack  | 
                    2020-03-10 21:29:49 | 
| 195.54.167.40 | attackspam | Excessive Port-Scanning  | 
                    2020-03-10 21:23:20 | 
| 113.190.74.181 | attackspambots | Email rejected due to spam filtering  | 
                    2020-03-10 21:24:55 | 
| 162.243.10.64 | attack | 2020-03-10T14:04:55.328462ns386461 sshd\[11758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64 user=mail 2020-03-10T14:04:56.810498ns386461 sshd\[11758\]: Failed password for mail from 162.243.10.64 port 49750 ssh2 2020-03-10T14:09:37.551974ns386461 sshd\[16100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64 user=root 2020-03-10T14:09:39.747108ns386461 sshd\[16100\]: Failed password for root from 162.243.10.64 port 59054 ssh2 2020-03-10T14:11:34.359957ns386461 sshd\[17789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64 user=root ...  | 
                    2020-03-10 21:41:39 | 
| 223.80.100.87 | attackbots | Mar 10 10:22:43 hosting180 sshd[13888]: Invalid user user13 from 223.80.100.87 port 2483 ...  | 
                    2020-03-10 21:55:51 | 
| 102.115.242.59 | attackspambots | Email rejected due to spam filtering  | 
                    2020-03-10 21:34:29 | 
| 200.88.52.122 | attackspambots | Mar 10 14:30:08 localhost sshd\[11188\]: Invalid user m3chen from 200.88.52.122 port 40110 Mar 10 14:30:08 localhost sshd\[11188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.88.52.122 Mar 10 14:30:11 localhost sshd\[11188\]: Failed password for invalid user m3chen from 200.88.52.122 port 40110 ssh2  | 
                    2020-03-10 21:55:10 | 
| 59.11.157.64 | attackbotsspam | Mon, 09 Mar 2020 20:58:35 -0400 Received: from [59.11.157.64] (port=41595 helo=ltc-performance.com) From: "Support"  | 
                    2020-03-10 21:53:57 | 
| 36.90.48.142 | attack | port scan and connect, tcp 22 (ssh)  | 
                    2020-03-10 22:02:01 | 
| 123.16.159.58 | attackbotsspam | Lines containing failures of 123.16.159.58 (max 1000) Mar 10 15:05:13 Server sshd[28775]: Did not receive identification string from 123.16.159.58 port 51578 Mar 10 15:05:16 Server sshd[28776]: Invalid user admin1 from 123.16.159.58 port 59100 Mar 10 15:05:17 Server sshd[28776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.16.159.58 Mar 10 15:05:19 Server sshd[28776]: Failed password for invalid user admin1 from 123.16.159.58 port 59100 ssh2 Mar 10 15:05:19 Server sshd[28776]: Connection closed by invalid user admin1 123.16.159.58 port 59100 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=123.16.159.58  | 
                    2020-03-10 21:35:29 | 
| 91.132.1.142 | attack | Registration form abuse  | 
                    2020-03-10 22:08:07 | 
| 122.154.59.82 | attackbotsspam | Mar 10 10:06:50 pl3server sshd[29090]: Did not receive identification string from 122.154.59.82 Mar 10 10:07:08 pl3server sshd[29260]: Invalid user support from 122.154.59.82 Mar 10 10:07:08 pl3server sshd[29260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.59.82 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=122.154.59.82  | 
                    2020-03-10 22:04:32 | 
| 54.236.132.128 | attackbots | Fail2Ban Ban Triggered  | 
                    2020-03-10 22:07:00 |