City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.53.133.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30710
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.53.133.196.			IN	A
;; AUTHORITY SECTION:
.			476	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:05:51 CST 2022
;; MSG SIZE  rcvd: 106
        196.133.53.13.in-addr.arpa domain name pointer ec2-13-53-133-196.eu-north-1.compute.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
196.133.53.13.in-addr.arpa	name = ec2-13-53-133-196.eu-north-1.compute.amazonaws.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 212.232.43.182 | attackspam | Automatic report - Port Scan Attack  | 
                    2019-08-15 03:41:07 | 
| 191.53.238.149 | attackspam | Aug 14 15:04:18 xeon postfix/smtpd[10611]: warning: unknown[191.53.238.149]: SASL PLAIN authentication failed: authentication failure  | 
                    2019-08-15 03:24:46 | 
| 5.249.145.73 | attackbots | Aug 14 14:42:18 XXX sshd[6287]: Invalid user mona from 5.249.145.73 port 57563  | 
                    2019-08-15 03:43:22 | 
| 121.14.70.29 | attackbots | Aug 14 17:07:27 Ubuntu-1404-trusty-64-minimal sshd\[4664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.14.70.29 user=root Aug 14 17:07:29 Ubuntu-1404-trusty-64-minimal sshd\[4664\]: Failed password for root from 121.14.70.29 port 36562 ssh2 Aug 14 17:16:37 Ubuntu-1404-trusty-64-minimal sshd\[9688\]: Invalid user ftpadmin from 121.14.70.29 Aug 14 17:16:37 Ubuntu-1404-trusty-64-minimal sshd\[9688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.14.70.29 Aug 14 17:16:39 Ubuntu-1404-trusty-64-minimal sshd\[9688\]: Failed password for invalid user ftpadmin from 121.14.70.29 port 37494 ssh2  | 
                    2019-08-15 03:54:39 | 
| 36.89.190.211 | attack | fail2ban honeypot  | 
                    2019-08-15 03:40:50 | 
| 51.83.76.36 | attackbots | 2019-08-14T15:41:18.539461abusebot-7.cloudsearch.cf sshd\[7820\]: Invalid user user from 51.83.76.36 port 43200  | 
                    2019-08-15 03:51:01 | 
| 103.88.232.118 | attackspam | SMB Server BruteForce Attack  | 
                    2019-08-15 03:39:03 | 
| 212.49.66.235 | attackbots | Automatic report - Banned IP Access  | 
                    2019-08-15 03:41:38 | 
| 136.63.96.92 | attackspam | Automatic report - Banned IP Access  | 
                    2019-08-15 04:02:01 | 
| 193.169.39.254 | attackbotsspam | Aug 14 14:43:29 XXX sshd[6333]: Invalid user apples from 193.169.39.254 port 42748  | 
                    2019-08-15 03:24:27 | 
| 146.185.133.99 | attackspambots | 146.185.133.99 - - [14/Aug/2019:20:05:50 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 146.185.133.99 - - [14/Aug/2019:20:05:55 +0200] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 146.185.133.99 - - [14/Aug/2019:20:05:56 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 146.185.133.99 - - [14/Aug/2019:20:06:01 +0200] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 146.185.133.99 - - [14/Aug/2019:20:06:01 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 146.185.133.99 - - [14/Aug/2019:20:06:06 +0200] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 146.185  | 
                    2019-08-15 03:28:14 | 
| 96.1.105.126 | attack | detected by Fail2Ban  | 
                    2019-08-15 03:44:37 | 
| 167.114.251.164 | attackspam | Aug 14 14:42:39 XXX sshd[6301]: Invalid user strenesse from 167.114.251.164 port 54939  | 
                    2019-08-15 03:36:10 | 
| 112.85.42.194 | attackbotsspam | Aug 14 21:06:01 legacy sshd[2869]: Failed password for root from 112.85.42.194 port 45455 ssh2 Aug 14 21:07:51 legacy sshd[2893]: Failed password for root from 112.85.42.194 port 19779 ssh2 ...  | 
                    2019-08-15 03:33:06 | 
| 213.4.33.11 | attack | Invalid user copy from 213.4.33.11 port 51260  | 
                    2019-08-15 03:29:18 |