City: Frankfurt am Main
Region: Hesse
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.131.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45513
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.162.131.242.		IN	A
;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:06:33 CST 2022
;; MSG SIZE  rcvd: 108242.131.162.139.in-addr.arpa domain name pointer li1397-242.members.linode.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
242.131.162.139.in-addr.arpa	name = li1397-242.members.linode.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 182.61.55.154 | attackbotsspam | Bruteforce detected by fail2ban | 2020-04-06 07:19:49 | 
| 218.92.0.171 | attack | 04/05/2020-19:05:55.003334 218.92.0.171 Protocol: 6 ET SCAN Potential SSH Scan | 2020-04-06 07:07:46 | 
| 13.90.170.53 | attack | SSH Brute-Forcing (server2) | 2020-04-06 07:36:20 | 
| 51.89.22.198 | attackspambots | $f2bV_matches | 2020-04-06 07:22:49 | 
| 218.72.200.32 | attackspam | Automatic report - Windows Brute-Force Attack | 2020-04-06 07:19:17 | 
| 181.58.120.115 | attackbots | $f2bV_matches | 2020-04-06 07:03:37 | 
| 207.154.218.16 | attackspam | SSH Brute-Forcing (server1) | 2020-04-06 07:09:35 | 
| 202.129.29.135 | attackbots | Triggered by Fail2Ban at Ares web server | 2020-04-06 07:01:33 | 
| 106.13.9.7 | attack | Apr 6 00:33:20 pkdns2 sshd\[40638\]: Failed password for root from 106.13.9.7 port 54250 ssh2Apr 6 00:36:39 pkdns2 sshd\[40835\]: Failed password for root from 106.13.9.7 port 53050 ssh2Apr 6 00:37:06 pkdns2 sshd\[40863\]: Failed password for root from 106.13.9.7 port 58450 ssh2Apr 6 00:37:33 pkdns2 sshd\[40880\]: Failed password for root from 106.13.9.7 port 35618 ssh2Apr 6 00:37:59 pkdns2 sshd\[40891\]: Failed password for root from 106.13.9.7 port 41018 ssh2Apr 6 00:38:26 pkdns2 sshd\[40924\]: Failed password for root from 106.13.9.7 port 46414 ssh2 ... | 2020-04-06 07:04:50 | 
| 112.90.197.66 | attackbots | Apr 5 23:38:04 debian-2gb-nbg1-2 kernel: \[8381713.381705\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=112.90.197.66 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=234 ID=1035 PROTO=TCP SPT=59857 DPT=6380 WINDOW=1024 RES=0x00 SYN URGP=0 | 2020-04-06 07:23:27 | 
| 185.176.27.34 | attackspambots | Multiport scan : 28 ports scanned 15598 15599 15600 15695 15696 15697 15789 15790 15791 15883 15884 15885 15899 15900 15992 15993 15994 16086 16087 16088 16180 16181 16182 16195 16196 16197 16290 16291 | 2020-04-06 07:11:00 | 
| 67.205.135.127 | attack | (sshd) Failed SSH login from 67.205.135.127 (US/United States/vook2.ubuntu-s-2vcpu-4gb-nyc1-01): 10 in the last 3600 secs | 2020-04-06 07:09:22 | 
| 103.246.218.252 | attack | Apr 5 23:31:41 vmd26974 sshd[13131]: Failed password for root from 103.246.218.252 port 50698 ssh2 ... | 2020-04-06 07:36:48 | 
| 43.225.151.142 | attackspam | detected by Fail2Ban | 2020-04-06 07:18:48 | 
| 200.89.154.99 | attack | Apr 5 23:33:11 * sshd[32372]: Failed password for root from 200.89.154.99 port 33667 ssh2 | 2020-04-06 07:38:17 |