City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.93.104.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23464
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;136.93.104.96.			IN	A
;; AUTHORITY SECTION:
.			564	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010901 1800 900 604800 86400
;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 07:55:50 CST 2022
;; MSG SIZE  rcvd: 106Host 96.104.93.136.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 96.104.93.136.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 114.40.172.233 | attackspambots | 2323/tcp 23/tcp 23/tcp [2019-09-23/10-23]3pkt | 2019-10-24 13:58:00 | 
| 62.102.148.69 | attackspambots | Oct 24 03:53:53 thevastnessof sshd[3037]: Failed password for root from 62.102.148.69 port 42833 ssh2 ... | 2019-10-24 13:54:56 | 
| 189.207.250.86 | attackspambots | 445/tcp 445/tcp [2019-10-22/23]2pkt | 2019-10-24 14:02:02 | 
| 54.163.225.136 | attackspambots | Automatic report - XMLRPC Attack | 2019-10-24 13:45:53 | 
| 83.52.139.230 | attackbots | Oct 24 07:23:03 localhost sshd\[8885\]: Invalid user swsoft from 83.52.139.230 port 47952 Oct 24 07:23:03 localhost sshd\[8885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.52.139.230 Oct 24 07:23:05 localhost sshd\[8885\]: Failed password for invalid user swsoft from 83.52.139.230 port 47952 ssh2 | 2019-10-24 13:23:11 | 
| 62.210.149.30 | attackbots | \[2019-10-24 01:38:07\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-24T01:38:07.108-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01115183806824",SessionID="0x7f6130804e48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/57381",ACLName="no_extension_match" \[2019-10-24 01:47:42\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-24T01:47:42.778-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0015183806824",SessionID="0x7f6130804e48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/60656",ACLName="no_extension_match" \[2019-10-24 01:47:54\] SECURITY\[2046\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-24T01:47:54.117-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="915183806824",SessionID="0x7f613013d028",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.149.30/58343",ACLName="no_extension | 2019-10-24 13:53:04 | 
| 131.1.231.67 | attackbotsspam | Oct 24 06:46:49 docs sshd\[15810\]: Invalid user Professur123 from 131.1.231.67Oct 24 06:46:51 docs sshd\[15810\]: Failed password for invalid user Professur123 from 131.1.231.67 port 60766 ssh2Oct 24 06:50:37 docs sshd\[15919\]: Invalid user thabiso from 131.1.231.67Oct 24 06:50:39 docs sshd\[15919\]: Failed password for invalid user thabiso from 131.1.231.67 port 43498 ssh2Oct 24 06:54:30 docs sshd\[16048\]: Invalid user ciphercode from 131.1.231.67Oct 24 06:54:32 docs sshd\[16048\]: Failed password for invalid user ciphercode from 131.1.231.67 port 54466 ssh2 ... | 2019-10-24 13:17:39 | 
| 184.153.83.253 | attackbots | Automatic report - SSH Brute-Force Attack | 2019-10-24 14:04:47 | 
| 190.136.176.108 | attack | 445/tcp 1433/tcp [2019-10-22/23]2pkt | 2019-10-24 13:49:44 | 
| 89.197.125.206 | attackbots | 22/tcp 22/tcp [2019-10-20/24]2pkt | 2019-10-24 14:05:17 | 
| 106.75.176.111 | attackspam | Invalid user ayesha from 106.75.176.111 port 59094 | 2019-10-24 13:52:35 | 
| 222.186.42.4 | attackspam | Oct 24 07:39:35 SilenceServices sshd[19396]: Failed password for root from 222.186.42.4 port 28470 ssh2 Oct 24 07:39:40 SilenceServices sshd[19396]: Failed password for root from 222.186.42.4 port 28470 ssh2 Oct 24 07:39:54 SilenceServices sshd[19396]: error: maximum authentication attempts exceeded for root from 222.186.42.4 port 28470 ssh2 [preauth] | 2019-10-24 13:40:30 | 
| 112.175.124.2 | attackbots | 10/24/2019-01:28:02.838844 112.175.124.2 Protocol: 6 ET SCAN Potential SSH Scan | 2019-10-24 13:30:03 | 
| 118.42.125.170 | attackspambots | 2019-10-24T05:49:56.406326shield sshd\[2277\]: Invalid user garrysmod from 118.42.125.170 port 47286 2019-10-24T05:49:56.415209shield sshd\[2277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.42.125.170 2019-10-24T05:49:57.927087shield sshd\[2277\]: Failed password for invalid user garrysmod from 118.42.125.170 port 47286 ssh2 2019-10-24T05:54:18.749577shield sshd\[3371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.42.125.170 user=root 2019-10-24T05:54:20.562591shield sshd\[3371\]: Failed password for root from 118.42.125.170 port 34630 ssh2 | 2019-10-24 13:54:37 | 
| 173.249.2.109 | attackspam | 6379/tcp 6379/tcp 6379/tcp... [2019-10-04/24]63pkt,1pt.(tcp) | 2019-10-24 14:01:04 |