City: Lewiston
Region: Maine
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.181.199.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26905
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.181.199.97.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 29 00:04:37 CST 2025
;; MSG SIZE  rcvd: 10797.199.181.134.in-addr.arpa domain name pointer a22368.bates.edu.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
97.199.181.134.in-addr.arpa	name = a22368.bates.edu.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 190.206.133.254 | attackbotsspam | 445/tcp [2020-10-03]1pkt | 2020-10-05 01:04:02 | 
| 167.71.237.128 | attackbotsspam | (sshd) Failed SSH login from 167.71.237.128 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 4 11:48:59 optimus sshd[1531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.237.128 user=root Oct 4 11:49:01 optimus sshd[1531]: Failed password for root from 167.71.237.128 port 33500 ssh2 Oct 4 12:21:48 optimus sshd[14465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.237.128 user=root Oct 4 12:21:50 optimus sshd[14465]: Failed password for root from 167.71.237.128 port 56862 ssh2 Oct 4 12:23:35 optimus sshd[15156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.237.128 user=root | 2020-10-05 00:26:35 | 
| 123.235.55.6 | attackspambots | Automatic report - Banned IP Access | 2020-10-05 00:49:15 | 
| 68.183.114.34 | attackbots | DATE:2020-10-04 16:45:17, IP:68.183.114.34, PORT:ssh SSH brute force auth (docker-dc) | 2020-10-05 00:38:36 | 
| 139.255.52.58 | attackbotsspam | 445/tcp [2020-10-03]1pkt | 2020-10-05 00:25:34 | 
| 165.232.110.83 | attackspambots | Oct 4 00:33:53 www sshd\[5495\]: Invalid user git from 165.232.110.83Oct 4 00:33:54 www sshd\[5495\]: Failed password for invalid user git from 165.232.110.83 port 60804 ssh2Oct 4 00:37:46 www sshd\[5614\]: Invalid user reynaldo from 165.232.110.83 ... | 2020-10-05 01:05:23 | 
| 190.8.100.18 | attackbots | Port Scan ... | 2020-10-05 00:44:29 | 
| 176.212.108.205 | attackspambots | Telnet/23 MH Probe, Scan, BF, Hack - | 2020-10-05 00:39:33 | 
| 1.170.32.93 | attack | Port probing on unauthorized port 445 | 2020-10-05 00:42:08 | 
| 1.54.85.210 | attackspam | 445/tcp [2020-10-03]1pkt | 2020-10-05 01:03:35 | 
| 142.93.122.207 | attackbots | 142.93.122.207 - - [04/Oct/2020:18:20:02 +0200] "GET /wp-login.php HTTP/1.1" 200 1984 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [04/Oct/2020:18:20:08 +0200] "POST /wp-login.php HTTP/1.1" 200 2104 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [04/Oct/2020:18:20:13 +0200] "GET /wp-login.php HTTP/1.1" 200 1984 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [04/Oct/2020:18:20:14 +0200] "POST /wp-login.php HTTP/1.1" 200 2090 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [04/Oct/2020:18:20:19 +0200] "GET /wp-login.php HTTP/1.1" 200 1984 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 142.93.122.207 - - [04/Oct/2020:18:20:20 +0200] "POST /wp-login.php HTTP/1.1" 200 2091 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/201001 ... | 2020-10-05 00:28:37 | 
| 27.193.116.85 | attackbotsspam | port scan and connect, tcp 23 (telnet) | 2020-10-05 00:33:09 | 
| 36.111.182.133 | attackbotsspam | Fail2Ban Ban Triggered | 2020-10-05 00:53:50 | 
| 165.232.97.45 | attackbotsspam | Oct 4 00:40:53 tuotantolaitos sshd[174547]: Failed password for root from 165.232.97.45 port 35024 ssh2 ... | 2020-10-05 00:52:59 | 
| 104.237.233.111 | attack | Oct 4 18:16:35 server sshd[17966]: Failed password for root from 104.237.233.111 port 47478 ssh2 Oct 4 18:16:56 server sshd[18158]: Failed password for root from 104.237.233.111 port 43412 ssh2 Oct 4 18:17:12 server sshd[18276]: Failed password for root from 104.237.233.111 port 39182 ssh2 | 2020-10-05 00:40:11 |