City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.35.152.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51165
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;134.35.152.8.			IN	A
;; AUTHORITY SECTION:
.			589	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 06:17:23 CST 2022
;; MSG SIZE  rcvd: 105
        Host 8.152.35.134.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 8.152.35.134.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 128.199.79.37 | attackspam | Jul 28 03:26:09 v22018076622670303 sshd\[18538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.79.37 user=root Jul 28 03:26:10 v22018076622670303 sshd\[18538\]: Failed password for root from 128.199.79.37 port 36637 ssh2 Jul 28 03:31:26 v22018076622670303 sshd\[18574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.79.37 user=root ...  | 
                    2019-07-28 10:09:32 | 
| 162.246.211.20 | attackspambots | proto=tcp . spt=57325 . dpt=25 . (listed on Blocklist de Jul 27) (145)  | 
                    2019-07-28 10:48:11 | 
| 18.223.32.104 | attackbotsspam | Jul 28 04:24:27 [host] sshd[5966]: Invalid user money1 from 18.223.32.104 Jul 28 04:24:27 [host] sshd[5966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.223.32.104 Jul 28 04:24:28 [host] sshd[5966]: Failed password for invalid user money1 from 18.223.32.104 port 40354 ssh2  | 
                    2019-07-28 10:53:17 | 
| 151.80.162.216 | attackspam | Jul 28 04:08:11 mail postfix/smtpd\[655\]: warning: unknown\[151.80.162.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 28 04:10:52 mail postfix/smtpd\[743\]: warning: unknown\[151.80.162.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 28 04:11:27 mail postfix/smtpd\[683\]: warning: unknown\[151.80.162.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6  | 
                    2019-07-28 10:18:06 | 
| 223.202.201.220 | attack | Jul 28 03:27:27 mail sshd\[1405\]: Failed password for root from 223.202.201.220 port 44707 ssh2 Jul 28 03:43:25 mail sshd\[1692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.202.201.220 user=root ...  | 
                    2019-07-28 10:45:53 | 
| 212.7.222.249 | attack | 2019-07-28T03:14:48.627648stark.klein-stark.info postfix/smtpd\[21527\]: NOQUEUE: reject: RCPT from sense.mygrumpyfund.com\[212.7.222.249\]: 554 5.7.1 \  | 
                    2019-07-28 10:46:47 | 
| 108.36.94.38 | attack | Jul 27 22:10:47 plusreed sshd[18722]: Invalid user powerpuff from 108.36.94.38 ...  | 
                    2019-07-28 10:35:32 | 
| 51.77.53.229 | attackbotsspam | Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools  | 
                    2019-07-28 10:16:17 | 
| 118.25.92.221 | attackbotsspam | Jul 28 03:56:46 ns37 sshd[13845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.92.221  | 
                    2019-07-28 10:13:06 | 
| 35.241.165.236 | attack | /util/login.aspx /magento_version /install.php  | 
                    2019-07-28 10:30:58 | 
| 45.227.253.214 | attackspam | Jul 28 04:11:50 mail postfix/smtpd\[655\]: warning: unknown\[45.227.253.214\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 28 04:12:07 mail postfix/smtpd\[683\]: warning: unknown\[45.227.253.214\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jul 28 04:12:31 mail postfix/smtpd\[743\]: warning: unknown\[45.227.253.214\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6  | 
                    2019-07-28 10:18:55 | 
| 185.220.100.252 | attackbotsspam | leo_www  | 
                    2019-07-28 10:38:49 | 
| 185.123.220.150 | attackbots | SASL Brute Force  | 
                    2019-07-28 10:12:43 | 
| 91.185.236.239 | attack | proto=tcp . spt=47952 . dpt=25 . (listed on Blocklist de Jul 27) (138)  | 
                    2019-07-28 10:56:59 | 
| 51.15.1.221 | attackspam | Jul 28 01:15:22 thevastnessof sshd[10156]: Failed password for root from 51.15.1.221 port 42366 ssh2 ...  | 
                    2019-07-28 10:23:58 |