City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.57.196.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41950
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;13.57.196.143.			IN	A
;; AUTHORITY SECTION:
.			203	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:05:52 CST 2022
;; MSG SIZE  rcvd: 106
        143.196.57.13.in-addr.arpa domain name pointer ec2-13-57-196-143.us-west-1.compute.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
143.196.57.13.in-addr.arpa	name = ec2-13-57-196-143.us-west-1.compute.amazonaws.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 103.197.177.37 | attackbotsspam | Honeypot attack, port: 445, PTR: jdwnrh.thimphu.drukren.bt.  | 
                    2020-02-28 20:27:38 | 
| 104.211.115.85 | attack | SSH Brute Force  | 
                    2020-02-28 20:36:55 | 
| 36.74.152.197 | attackspambots | 1582865356 - 02/28/2020 05:49:16 Host: 36.74.152.197/36.74.152.197 Port: 445 TCP Blocked  | 
                    2020-02-28 20:17:27 | 
| 176.31.193.58 | attackspambots | Feb 28 05:34:11 vzhost sshd[18194]: Invalid user cabel from 176.31.193.58 Feb 28 05:34:13 vzhost sshd[18194]: Failed password for invalid user cabel from 176.31.193.58 port 56888 ssh2 Feb 28 05:53:36 vzhost sshd[23067]: Invalid user simple from 176.31.193.58 Feb 28 05:53:38 vzhost sshd[23067]: Failed password for invalid user simple from 176.31.193.58 port 39080 ssh2 Feb 28 06:04:22 vzhost sshd[25717]: Failed password for r.r from 176.31.193.58 port 48934 ssh2 Feb 28 06:14:50 vzhost sshd[28210]: Failed password for r.r from 176.31.193.58 port 58860 ssh2 Feb 28 06:25:29 vzhost sshd[31014]: Invalid user tomcat7 from 176.31.193.58 Feb 28 06:25:31 vzhost sshd[31014]: Failed password for invalid user tomcat7 from 176.31.193.58 port 40698 ssh2 Feb 28 06:35:47 vzhost sshd[1018]: Invalid user data from 176.31.193.58 Feb 28 06:35:49 vzhost sshd[1018]: Failed password for invalid user data from 176.31.193.58 port 51758 ssh2 Feb 28 06:45:59 vzhost sshd[3618]: Invalid user user03 f........ -------------------------------  | 
                    2020-02-28 20:25:13 | 
| 176.99.237.106 | attackbotsspam | Telnet/23 MH Probe, Scan, BF, Hack -  | 
                    2020-02-28 20:23:45 | 
| 61.246.33.106 | attackspam | Brute-force attempt banned  | 
                    2020-02-28 20:53:49 | 
| 92.63.194.90 | attackspam | Feb 28 13:10:28 mout sshd[28740]: Invalid user 1234 from 92.63.194.90 port 41060 Feb 28 13:10:30 mout sshd[28740]: Failed password for invalid user 1234 from 92.63.194.90 port 41060 ssh2 Feb 28 13:10:30 mout sshd[28740]: Connection closed by 92.63.194.90 port 41060 [preauth]  | 
                    2020-02-28 20:51:06 | 
| 36.80.87.252 | attack | Honeypot attack, port: 445, PTR: PTR record not found  | 
                    2020-02-28 20:22:41 | 
| 189.167.38.156 | attackspam | Honeypot attack, port: 81, PTR: dsl-189-167-38-156-dyn.prod-infinitum.com.mx.  | 
                    2020-02-28 20:20:38 | 
| 94.177.215.195 | attackbots | (sshd) Failed SSH login from 94.177.215.195 (IT/Italy/host195-215-177-94.serverdedicati.aruba.it): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 28 13:29:04 ubnt-55d23 sshd[845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.215.195 user=root Feb 28 13:29:06 ubnt-55d23 sshd[845]: Failed password for root from 94.177.215.195 port 43486 ssh2  | 
                    2020-02-28 20:48:58 | 
| 94.102.56.215 | attack | 94.102.56.215 was recorded 5 times by 5 hosts attempting to connect to the following ports: 40870,40860,40867. Incident counter (4h, 24h, all-time): 5, 125, 5804  | 
                    2020-02-28 20:12:30 | 
| 123.28.173.154 | attack | unauthorized connection attempt  | 
                    2020-02-28 20:11:56 | 
| 36.71.237.0 | attack | 1582865292 - 02/28/2020 05:48:12 Host: 36.71.237.0/36.71.237.0 Port: 445 TCP Blocked  | 
                    2020-02-28 20:52:14 | 
| 117.64.248.14 | attack | [portscan] Port scan  | 
                    2020-02-28 20:44:53 | 
| 120.92.91.176 | attackbots | Feb 28 05:49:13 lnxded63 sshd[8145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.91.176  | 
                    2020-02-28 20:19:59 |