City: Frankfurt am Main
Region: Hesse
Country: Germany
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.132.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.162.132.160.		IN	A
;; AUTHORITY SECTION:
.			354	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:06:33 CST 2022
;; MSG SIZE  rcvd: 108160.132.162.139.in-addr.arpa domain name pointer node4.digitmovies.com.Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
160.132.162.139.in-addr.arpa	name = node4.digitmovies.com.
Authoritative answers can be found from:| IP | Type | Details | Datetime | 
|---|---|---|---|
| 148.70.187.205 | attackspambots | Invalid user xander from 148.70.187.205 port 60716 | 2020-04-01 16:47:59 | 
| 149.56.44.101 | attack | Invalid user takahashi from 149.56.44.101 port 36250 | 2020-04-01 16:41:07 | 
| 69.229.6.4 | attackspam | Invalid user zlr from 69.229.6.4 port 54886 | 2020-04-01 16:29:24 | 
| 212.64.40.155 | attackbots | Invalid user wordpress from 212.64.40.155 port 47688 | 2020-04-01 16:24:49 | 
| 95.186.16.57 | attackbotsspam | Brute force attack against VPN service | 2020-04-01 16:43:54 | 
| 122.202.48.251 | attack | Invalid user test from 122.202.48.251 port 47332 | 2020-04-01 16:29:10 | 
| 120.132.13.151 | attackbots | Invalid user yanzhiping from 120.132.13.151 port 51406 | 2020-04-01 16:18:05 | 
| 78.241.226.27 | attackspambots | (sshd) Failed SSH login from 78.241.226.27 (FR/France/Allier/Montluçon/piq03-1-78-241-226-27.fbx.proxad.net/[AS12322 Free SAS]): 1 in the last 3600 secs | 2020-04-01 16:42:48 | 
| 176.186.77.215 | attackspam | Invalid user ndj from 176.186.77.215 port 58406 | 2020-04-01 16:37:47 | 
| 142.93.140.242 | attackbots | k+ssh-bruteforce | 2020-04-01 16:34:36 | 
| 182.61.105.146 | attack | Apr 1 10:29:13 ns382633 sshd\[32429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.146 user=root Apr 1 10:29:15 ns382633 sshd\[32429\]: Failed password for root from 182.61.105.146 port 46486 ssh2 Apr 1 10:35:44 ns382633 sshd\[1498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.146 user=root Apr 1 10:35:46 ns382633 sshd\[1498\]: Failed password for root from 182.61.105.146 port 48896 ssh2 Apr 1 10:38:38 ns382633 sshd\[1871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.146 user=root | 2020-04-01 16:50:56 | 
| 45.64.126.103 | attackspambots | SSH brute-force attempt | 2020-04-01 16:27:11 | 
| 61.14.210.88 | attackspambots | $f2bV_matches | 2020-04-01 16:12:59 | 
| 106.54.19.67 | attackbots | Invalid user rle from 106.54.19.67 port 60646 | 2020-04-01 16:41:22 | 
| 164.155.127.115 | attackbots | 04/01/2020-03:53:41.542264 164.155.127.115 Protocol: 1 ET DROP Spamhaus DROP Listed Traffic Inbound group 16 | 2020-04-01 16:30:23 |