City: London
Region: England
Country: United Kingdom
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.194.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22832
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.162.194.44.			IN	A
;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:08:24 CST 2022
;; MSG SIZE  rcvd: 107
        44.194.162.139.in-addr.arpa domain name pointer 139-162-194-44.ip.linodeusercontent.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
44.194.162.139.in-addr.arpa	name = 139-162-194-44.ip.linodeusercontent.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 139.199.248.153 | attackspambots | Jan 1 22:53:40 marvibiene sshd[9952]: Invalid user aristide from 139.199.248.153 port 45042 Jan 1 22:53:40 marvibiene sshd[9952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.153 Jan 1 22:53:40 marvibiene sshd[9952]: Invalid user aristide from 139.199.248.153 port 45042 Jan 1 22:53:42 marvibiene sshd[9952]: Failed password for invalid user aristide from 139.199.248.153 port 45042 ssh2 ...  | 
                    2020-01-02 07:38:22 | 
| 176.95.159.105 | attackbotsspam | Jan 2 00:11:24 haigwepa sshd[32391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.95.159.105 Jan 2 00:11:26 haigwepa sshd[32391]: Failed password for invalid user guest from 176.95.159.105 port 58606 ssh2 ...  | 
                    2020-01-02 07:30:27 | 
| 62.210.205.155 | attackbotsspam | Invalid user admin from 62.210.205.155 port 36446  | 
                    2020-01-02 07:24:48 | 
| 123.139.42.226 | attack | port scan and connect, tcp 1433 (ms-sql-s)  | 
                    2020-01-02 07:26:39 | 
| 106.53.23.4 | attack | Jan 2 00:24:46 [host] sshd[16687]: Invalid user gjetoe from 106.53.23.4 Jan 2 00:24:46 [host] sshd[16687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.23.4 Jan 2 00:24:48 [host] sshd[16687]: Failed password for invalid user gjetoe from 106.53.23.4 port 53806 ssh2  | 
                    2020-01-02 07:41:49 | 
| 106.12.80.138 | attack | Invalid user backup from 106.12.80.138 port 60034  | 
                    2020-01-02 07:11:25 | 
| 196.52.43.66 | attackbots | Unauthorized connection attempt detected from IP address 196.52.43.66 to port 8888  | 
                    2020-01-02 07:28:22 | 
| 46.38.144.179 | attackspambots | Jan 1 18:32:04 web1 postfix/smtpd[28822]: warning: unknown[46.38.144.179]: SASL LOGIN authentication failed: authentication failure ...  | 
                    2020-01-02 07:44:59 | 
| 192.3.130.170 | attackspam | $f2bV_matches  | 
                    2020-01-02 07:25:44 | 
| 218.201.214.177 | attackspam | Brute-force attempt banned  | 
                    2020-01-02 07:40:11 | 
| 122.51.23.135 | attackbotsspam | Jan 2 00:06:20 legacy sshd[20581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.23.135 Jan 2 00:06:22 legacy sshd[20581]: Failed password for invalid user donatella from 122.51.23.135 port 60740 ssh2 Jan 2 00:09:21 legacy sshd[20751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.23.135 ...  | 
                    2020-01-02 07:21:27 | 
| 200.37.97.194 | attack | Jan 1 22:37:51 raspberrypi sshd\[9826\]: Invalid user mufinella from 200.37.97.194Jan 1 22:37:53 raspberrypi sshd\[9826\]: Failed password for invalid user mufinella from 200.37.97.194 port 51862 ssh2Jan 1 22:53:54 raspberrypi sshd\[10349\]: Invalid user callise from 200.37.97.194 ...  | 
                    2020-01-02 07:29:45 | 
| 121.176.20.92 | attackspam | ...  | 
                    2020-01-02 07:37:33 | 
| 182.61.40.227 | attackbots | 21 attempts against mh-ssh on cloud.magehost.pro  | 
                    2020-01-02 07:17:56 | 
| 190.186.42.245 | attackspam | Automatic report - Port Scan Attack  | 
                    2020-01-02 07:13:55 |